Book Contents

Security by inclusion

Important:

The following procedure applies only to accounts in the FactoryTalk View 3.x Accounts tab of the Runtime Security editor.

When you set up security by inclusion, you restrict access to specific parts of the system, leaving the rest available to all users. Use this method in situations where most users can have access to most of the graphic displays.

To set up security by inclusion

  1. In the Graphics editor, assign security codes to the graphic displays you want to restrict access to. Only the users with access to the assigned security codes will be able to use the restricted displays. All users will have unlimited access to the displays that have not been assigned a specific security code.
  2. In the Runtime Security editor, set up user accounts to specify which security codes users have access to. When you enter a user’s name in the Runtime Security spreadsheet, the default is for the user to have access (Y) to all codes. For each user, turn off access (N) to all the codes that user is not allowed to use.
  3. For the DEFAULT user in User Accounts, turn off access to those codes that are being used to restrict access to certain graphic displays. This ensures the security of the displays you have assigned these codes to.

See also

Security by exclusion

Set up FactoryTalk View 3.x user accounts

Example: Security by inclusion