User authentication and authorization
- Last UpdatedOct 30, 2024
- 1 minute read
Typically, ICS software is comprised of a large number of systems, each accessed by a variety of users including engineers, operators and managers. The level of access that each type of user requires is different. So, it is necessary to manage user authentication and authorization to secure the system.
The following topics are covered in this section: