Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Production Management

Types of authentications in AVEVA Production Management

Types of authentications in AVEVA Production Management

  • Last UpdatedMar 24, 2025
  • 2 minute read

AVEVA™ Production Management offers the choice between three methods of login security:

Integrated security

Integrated security, AVEVA™ Production Management uses the identity of the currently logged on Windows user. Windows Integrated security is recommended in most situations, because enables faster and easier log on.

The User Group type provides integrated security. To learn how to add a user group, see Add a User Group

Studio project hierarchy view showing the context menu options for User configuration item, highlighting the Add User Group option.

Integrated (Other User)

When logging into Production Analyst, the Integrated (Other User) option allows you to enter a different set of Windows user credentials than the current Windows user account.

Note: When an integrated user is removed or added in Active Directory, it will take around 5 minutes for Active Directory to synchronize with Windows. Changes will be visible after 5 minutes and after restarting Production Analyst.

Production Analyst login screen showing the Credential field options, which include Integrated, Basic, and Integrated (Other User).

Basic security

With basic security, the Basic user provides a user name and password. This security is used only by the Basic User type. To learn how to add a basic user, see, Add a Basic User.

Studio project hierarchy view showing the context menu options for User configuration item, highlighting the Add Basic User option.

NOTICE

UNAUTHORIZED SECURITY ACCESS

  • Protect your password from unauthorized access.

  • Change or disable default passwords, since default settings are often easy to find in user manuals.

  • Change your passwords regularly.

  • Do not choose simple user names and passwords to prevent malicious access.

In This Topic
Related Links
TitleResults for “How to create a CRG?”Also Available in