Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Plant SCADA

Security Configuration for Plant SCADA

  • Last UpdatedJul 13, 2023
  • 1 minute read

The table below lists the security areas that you need to configure for Plant SCADA and the details of the section(s) in this guide that provide the corresponding instructions.

Security Area(s)

Topic(s) in this guide

Summary

Manage access through users and groups

Runtime System Security

You can restrict which functions a user is allowed to perform by linking those functions to a defined set of areas and privileges.

Secure a runtime system through authentication and authorization

Security Roles

Plant SCADA uses a set of security roles to manage access to sensitive components within the runtime system.

Each role provides a different level of access to features, applications and project resources.

Use Windows users accounts

Integrate Windows™ User Groups

Plant SCADA provides the ability to integrate Windows user accounts into the security model for a runtime system.

You can achieve this by linking domain Windows user accounts to a role defined within Plant SCADA.

Protect the application on the host runtime computer

Secure Runtime Computers

There are several ways you can limit runtime access to the host operating system or software other than Plant SCADA.

Enable encrypted communications

Encrypted Communications

Communications between Plant SCADA processes, computers and CtAPI can be encrypted.

A System Management Server is required to manage the certificates that enable trusted communications.

See Also

Security

TitleResults for “How to create a CRG?”Also Available in