Security Configuration for Plant SCADA
- Last UpdatedJul 13, 2023
- 1 minute read
The table below lists the security areas that you need to configure for Plant SCADA and the details of the section(s) in this guide that provide the corresponding instructions.
|
Security Area(s) |
Topic(s) in this guide |
Summary |
|---|---|---|
|
Manage access through users and groups |
You can restrict which functions a user is allowed to perform by linking those functions to a defined set of areas and privileges. |
|
|
Secure a runtime system through authentication and authorization |
Plant SCADA uses a set of security roles to manage access to sensitive components within the runtime system. Each role provides a different level of access to features, applications and project resources. |
|
|
Use Windows users accounts |
Plant SCADA provides the ability to integrate Windows user accounts into the security model for a runtime system. You can achieve this by linking domain Windows user accounts to a role defined within Plant SCADA. |
|
|
Protect the application on the host runtime computer |
There are several ways you can limit runtime access to the host operating system or software other than Plant SCADA. |
|
|
Enable encrypted communications |
Communications between Plant SCADA processes, computers and CtAPI can be encrypted. A System Management Server is required to manage the certificates that enable trusted communications. |