Configuring Security Features
Configuring Security Features
The information contained in this manual is believed to be accurate and reliable. However, GE Intelligent Platforms,
Inc. assumes no responsibilities for any errors, omissions or inaccuracies whatsoever. Without limiting the foregoing,
GE Intelligent Platforms, Inc. disclaims any and all warranties, expressed or implied, including the warranty of mer-
chantability and fitness for a particular purpose, with respect to the information contained in this manual and the
equipment or software described herein. The entire risk as to the quality and performance of such information, equip-
ment and software, is upon the buyer or user. GE Intelligent Platforms, Inc. shall not be liable for any damages, includ-
ing special or consequential damages, arising out of the use of such information, equipment and software, even if GE
Intelligent Platforms, Inc. has been advised in advance of the possibility of such damages. The use of the information
contained in the manual and the software described herein is subject to GE Intelligent Platforms, Inc. standard
license agreement, which must be accepted by the buyer or user before the use of such information, equipment or
software.
Trademark Notices
Proficy is a trademark of GE Intelligent Platforms, Inc., a wholly-owned subsidiary of General Electric Company.
All other product names and marks identified throughout this book are trademarks or registered trademarks of their
respective companies. They are used throughout this book in editorial fashion only. No such use, or the use of any
trade name, is intended to convey endorsement or affiliation.
No part of this publication may be reproduced in any form, or stored in a database or retrieval system, or transmitted
or distributed in any form by any means, electronic, mechanical photocopying, recording or otherwise, without the
prior written permission of GE Intelligent Platforms. Information contained herein is subject to change without notice.
We want to hear from you. If you have any comments, questions, or suggestions about our documentation, send them
to the following email address:
doc@ge.com
Table of Contents
Reference Documents 1
Introduction 2
Security Files 5
User Accounts 6
Group Accounts 7
Assigning Privileges 8
Security Areas 10
Electronic Signatures 16
To ensure that the Windows taskbar does not display on top of the WorkSpace in Full Screen
mode: 30
Operational Overview 37
Administrative Considerations 38
Configuration Strategy 42
Node-based Security 45
User-based Security 46
Examples 51
Troubleshooting 58
Authorized 65
Available 65
Add All 65
Add 65
Delete 65
Delete All 65
Add 66
Modify 66
Delete 66
Node 66
Application User 66
System User 66
Security Path 67
Backup Path 67
Area 67
Name 67
Current Groups 67
Add 67
Modify 68
Delete 68
Authorized 68
Available 68
Add All 68
Add 68
Delete 68
Delete All 68
Group Name 68
Application Features 69
Modify 69
Security Areas 69
Modify 69
Authorized 70
Available 70
Add All 70
Add 70
Delete 70
Delete All 70
Current Users 70
Add 70
Modify 70
Delete 71
Group 72
Security 72
Application 72
Modify 72
How Do I... 72
Configuring Security 82
Index 91
Configuring Security Features is intended for system administrators who must configure and maintain
security for iFIX® systems. The manual explains the concepts of iFIX security and steps you through the
process of configuring iFIX security.
Reference Documents
For related information about iFIX, refer to the following manuals:
l Understanding iFIX
l Writing Scripts
l Creating Recipes
l Using Electronic Signatures
l Setting Up the Environment
As iFIX monitors your process, it creates data files, such as alarm files; iFIX also modifies and updates
other data, such as the process database. In some companies, access to iFIX applications and data files is
available to everyone. In such an environment, changes to the data files and access to iFIX files and applic-
ations are not critical to the process. However, in other companies these applications and data are only
available to authorized personnel because they are critical to the process.
iFIX provides an integrated security program to assist you in protecting your process. Refer to the fol-
lowing sections for more details:
There are different levels of security that you can implement to protect your process. On one level, you can
control the physical security of your machines and buildings. On another level, you can implement security
for your operating system and your network using firewalls, passwords, and filters.
You can also restrict access to your iFIX applications and files, and protect your data files from unau-
thorized changes, by enabling iFIX security. This manual focuses on iFIX security. iFIX security is optional
and is disabled by default. When you enable iFIX security, you can restrict:
Enabling security also allows you to track all the changes to the process database and forces operators to
log in to iFIX. Logging in requires a login name and an optional password. Depending on your con-
figuration, this data can be the same or separate from your Windows® login name and password. Refer to
the Using iFIX with Windows Security chapter for more information.
iFIX security is user-based, meaning operators cannot access iFIX applications, files, or database blocks
unless you assign access to them. Assigning program, file, or database access to an operator is commonly
referred to as assigning a privilege to that operator.
You can enable security using the Security Configuration program. This program is a flexible and easy-to-
use application that lets you assign operator rights, login names, and passwords. Refer to the Defining and
Assigning Security Privileges chapter for more information
User Account – defines the privileges assigned to one person. iFIX identifies each user account with a
login name and an optional password. User accounts can belong to one or more groups. When a user
account belongs to a group, it inherits all the privileges associated with the group. The user account
can have privileges in addition to the group privileges.
Group Account – assigns access to the most commonly-used privileges that two or more people must
share. Allows you to bundle a set of privileges and assign them in one step to a user account.
Application Feature – a privilege that allows an operator to access specific application functions. For
example, the WorkSpace Runtime application feature provides access to the WorkSpace run-time
environment. To help simplify explanations, this manual collectively refers to applications and specific
application functions as application features.
Security Area – a physical or functional division of a plant. For example, security areas can be process
hardware (such as pumps or ovens), utilities (such as fuel, water, or steam), or maintenance functions.
The following figure shows how user accounts, group accounts, application features, and security areas
interrelate. Each user account has privileges that are directly assigned and inherits any privileges
assigned to the groups to which the user account belongs.
Security Concepts
Electronic Signature – uniquely identifies operators performing or verifying changes to your process. You
can require operators to enter a user name and password before acknowledging an alarm or entering
data. This functionality can assist you in becoming compliant with the 21 CFR Part 11 United States FDA
government regulation.
When you initially start the iFIX Security Configuration program, iFIX security is disabled. The Security Con-
figuration program indicates this status by displaying an open lock on the screen. While security is dis-
abled, anyone can use iFIX programs or modify iFIX configuration files without restriction. Electronic
signature capability is also disabled when security is disabled.
When you enable security, the lock closes and operators must log into iFIX with their user accounts to gain
access. For instructions on enabling and disabling security, refer to the section Enabling and Disabling
Security.
Your main design goal when developing an iFIX security strategy is to create group and user accounts.
Using groups minimizes the amount of work needed to create the accounts while providing you with flex-
ibility and power. For example, instead of creating five operator accounts that all assign the same security
areas and application features, you can create one group account with these privileges and then assign
the group account to the five operators.
To achieve this goal, assess your operators' needs and identify the common privileges they require. Once
you identify these common privileges, you can create group accounts that provide them.
For example, John, Dave, Tim, and George are all iFIX operators. Their needs are summarized in the fol-
lowing table:
Since each operator requires access to the same application features and security areas, it is possible to
create a group account called Operators that provides these privileges. Once you create the group
account, you can assign it to each operator's user account, as the following figure shows.
Security Files
Using a file server, you can eliminate the need to copy security files to multiple computers. The simplest
way to share your security files is to enter your file server path as the security path. To learn how to
change the security path, refer to the section, Defining the Security Path.
You can set up security without a file server by storing all the security files and the Security Configuration
program on each local computer. The security files reside in a path called the security path, which the
Security Configuration program defines.
Security also keeps another copy of the security files in a path called the backup path. Security uses this
path when it cannot find the security path, for example, if the security path becomes unavailable.
Once you set up security and enable it on one computer, you must duplicate the security configuration on
every node. The simplest way to do this is to copy your security files to every computer on your network.
For a list of files to copy, refer to the Troubleshooting chapter.
Also, make sure you enable security on every node. Otherwise, security may not function properly.
User Accounts
A user account defines the privileges assigned to one person. iFIX identifies each user account with a login
name and an optional password. User accounts can belong to one or more groups. When a user account
belongs to a group, it inherits all the privileges associated with the group. The user account can have priv-
ileges in addition to the group privileges
When designing a user account, always include the user's full name, login name, and password in your
security plan. If you plan to use Windows security, you should also include the domain name if you plan to
store the user accounts on a domain controller.
Including the user's full name is especially important when you are using electronic signatures, because
the full name is recorded in messages sent to the audit trail for electronic signatures.
Group Accounts
Whenever possible, use group accounts to assign the majority of account privileges. You greatly simplify
creating a security configuration if you take the time and effort to assess your operators' needs. If the
security requirements at your site do not warrant such an effort, use the sample group accounts provided.
These accounts provide you with a simpler approach to Configuring Security Features. For example, the
sample group accounts define functional roles in a manufacturing facility. You could easily create other
group accounts, such as those listed in the following table.
Typically, when assigning privileges to an operator, you select the necessary group accounts first. This
assigns common privileges needed by two or more operators doing similar tasks. Then, you can add any
specific privileges an operator may require. Configuring your group and user accounts in this way provides
a modular approach that is easy to maintain.
For example, in the following figure, the group account Operators defines access to the Proficy iFIX
WorkSpace run-time environment and specific security areas. These privileges define the common secur-
ity rights shared by all operators. If an individual operator needs additional rights, for example, to enter
electronic signatures, you can assign those rights in his or her own user account.
Assigning Privileges
After you create your group accounts, you can assign any remaining privileges to individual user accounts.
These remaining rights should be unique privileges assigned to one person. If, however, you find that two
or more operators require the same privileges, consider creating additional group accounts.
For example, consider the operator accounts for John, Dave, Tim, and George. Assume that George and
Dave need additional privileges to perform electronic signatures and access another security area, while
Tim needs access to the functional security area Ovens. Since Tim is the only operator who requires
access to this security area, you can assign it directly to his user account. However, because both George
and Dave require an extra application feature and security area, you might want to create a second group
account to provide these privileges. This is illustrated in the following figure.
While the best way to maintain flexibility in your security strategy is to define common privileges with
group accounts, you may find it easier not to use them. In general, this happens when you only have to cre-
ate a small number of identical user accounts. If you decide not to include group accounts in your security
plan, you can save time creating identical user accounts as described in the following steps.
To create identical user accounts:
Security Areas
You should keep a separate list of security areas as you plan each group and user account. When you fin-
ish, the resulting list contains the names of the security areas you require, allowing you to define your
security areas in one session instead of multiple sessions.
Security areas restrict access to database blocks, operator displays, schedules, and recipes. The following
table summarizes the access restrictions provided by security areas.
If someone attempts to change a block's value illegally, security generates a message containing the login
name of the person who attempted the change. iFIX sends this message to the security audit trail and
every enabled alarm destination except the Alarm Summary. To learn more about these messages, refer
to the Implementing Alarms and Messages manual. To learn about the security audit trail, refer to the
Understanding the Security Log File section.
Using the GE Intelligent Platforms recipe package, you can download recipes to a process database. Typ-
ically, when security is enabled, you can protect the blocks in each process database by assigning them to
security areas. As a result, recipe downloads can fail because the current operator may not have rights to
change the blocks to which the recipe writes.
You can eliminate this problem by creating a recipe user account. This account defines the security areas
to which your recipes can download. When a download begins, iFIX examines the security areas assigned
to the Recipe user account instead of the currently logged in operator.
l Naming it RECIPE.
l Defining the required security areas.
Once you create the account, copy it to the security path of every SCADA server.
IMPORTANT: Security loads the Recipe user account into memory the first time a recipe downloads. If you modify
this account, the local computer continues to use the version in memory. To force the computer to re-read the new
version, log out the current user, log in with the Recipe user account, and log out again.
Be aware that using "RECIPE" as a domain user account is not supported in the Proficy iFIX product. If you
do attempt to use RECIPE as a domain user name, you will be able to download a recipe on a SCADA node,
but not on a View node.
You should familiarize yourself with the available application features before you design any group or user
account. Very often it is possible to assign an application feature for a specific application function, such as
the Proficy iFIX WorkSpace run-time environment, without providing access to the entire application. The
following table lists the available application features.
The logged-in user needs this if iFIX is running as a service and they log off the machine.
Enable Task Switch between tasks.
Switching
FIX32 - Perform a specified action in a FIX Desktop application. Be aware that FIX Desktop is no
[Action] longer supported, as of iFIX 5.8.
GE Intelligent Access an application feature defined by an OEM (Original Equipment Manufacturer). You
Platforms can provide access for up to 12 OEM application features.
OEM
Reserved #1-
12
Historical Configure the Classic Historical Assign program.
Trend Assign
Historical Stop the Classic Historian HTC program.
Trend Col-
lection
Historical Legacy application feature that is not used in iFIX.
Trend Export
iFIX - System Shut down iFIX.
Shutdown
Manual Fail- Allows you to manually initiate a connection or SCADA failover.
over
Project Back up and restore the iFIX files on the local node.
Backup-
Restore
Recipe Create master and control recipes, enable and disable the audit trail, assign tag groups to
Builder Devel- recipes, and scale a batch.
opment Win-
dow
Recipe Modify control recipes and override recipe items within specific limits.
Builder Oper-
ations Win-
dow
Recipe Down- Download recipes from the Recipe Builder.
load from
Recipe
Builder
Recipe Load Legacy application feature that is not used in iFIX.
Recipe Save Legacy application feature that is not used in iFIX.
Recipe Save Save recipes.
NOTE: Refer to the Proficy Batch Execution documentation for more information about the application features
specific to Proficy Batch Execution.
l Security Configuration
l iFIX - System Shutdown
l Background Task Exit
l Enable Ctrl-Alt-Del
The Security Configuration application feature should be assigned to your system administrator or the per-
son in your organization responsible for creating and maintaining iFIX security. In fact, iFIX security
requires you to assign the application feature to at least one user account; providing access to the pro-
gram with a group account does not fulfill this requirement.
The iFIX - System Shutdown and Background Task Exit application features should be assigned to anyone
responsible for shutting down iFIX. If no one is assigned these features, it will be impossible to shut down
iFIX programs in an orderly fashion.
The Enable Ctrl-Alt-Del application feature should be assigned to at least one user if you are planning to
enable Environment Protection. Also, it should be assigned to the user that is logged in when iFIX is con-
figured to run as a service under Windows.
The Proficy iFIX WorkSpace provides a run-time environment. While an operator is in this environment,
you may not want them to:
By enabling environment protection, you restrict operators from performing these actions and provide a
secure run-time environment. For more information on setting up a secured environment, refer to the sec-
tion Restricting Access in the Run-time Environment.
After you configure a secure environment, the Proficy iFIX WorkSpace uses your settings as defaults for
the run-time environment. You can set up a user account to override one or more of these settings by
TIP: Be aware that you if you disable the WorkSpace title bar, menu bar, and pull-down menus, it may not be obvi-
ous how to shut down the WorkSpace window in run mode. This is a security feature. If the shut down ability is
desired, configure your security appropriately and inform your users of the Alt+F4 keyboard shortcut to close the
WorkSpace, or add a VBA script to shut down the WorkSpace. Refer to the Shut Down the iFIX WorkSpace with a
VBA Script section for more details on how to add this script to your picture.
One of the options you have when you enable environment protection is to restrict access to the Visual
Basic Editor. If access is not restricted, the editor appears when a compilation error or a run-time error
occurs, allowing you to correct the error.
However, when you restrict access, the Proficy iFIX WorkSpace suppresses the Visual Basic Editor even if
an error occurs. Consequently, if you plan to enable this option, your scripts must have error-handling
routines. Otherwise, an error message appears and the script terminates.
In addition to securing scripts, you can also secure pictures and schedules by using the Security Area prop-
erty. You can set this property on a picture or schedule using the Property window. For more information
on properties, refer to the Controlling Object Properties chapter in the Creating Pictures manual. This prop-
erty restricts access to a picture or schedule at run-time so that only users with rights to the specified area
can access the pictures and schedules assigned to the security area, as the following figure shows.
In the Securing Pictures and Schedules figure, notice that John can access the pictures and schedules in
the security area Line 1 because he has rights to it. However, Frank cannot access the area Line 1 because
Frank has rights to Line 5 only. If Frank attempts to open a picture or schedule in Line 1, a message box
appears alerting him of the security violation. The violation is also recorded in the security audit trail and
every enabled alarm destination except the Alarm Summary.
Pictures and schedules that you configure to preload at run-time are also restricted by the security area.
Consequently, if you assign the operator display OVERVIEW.GRF to the security area Line 4 and configure
the WorkSpace to load the picture automatically on startup, the picture will not load when John logs in
because he does not have rights to Line 4. Preloading schedules works the same way: the logged-in user
must have rights to the security area of the schedule, or the schedule does not run.
Electronic Signatures
Use electronic signatures to create a more secure environment by requiring that operators electronically
sign for all process changes and alarm acknowledgements. Electronic signatures uniquely identify the
operator making the change, and can require the electronic signature of another person to verify the
change.
Detailed permanent records of operator actions are written to and stored in a relational database. You
can query and report on these records, and then use this data to provide a comprehensive audit trail detail-
ing the history of your process.
The following application features give user or group accounts electronic signature privileges:
Refer to the Using Electronic Signatures manual for detailed information on using electronic signatures.
Application developers can allow certain operators the ability to write to specific SCADA nodes only. This
prevents the possibility of access from unknown or unauthorized nodes. This is an important feature to
ensure that operators are positioned physically close to the equipment they are manipulating.
By default, iFIX nodes accept connections from any remote node over TCP/IP. You can restrict access from
unknown or unauthorized nodes using the accept_unknown_host parameter in the NETWORK.INI file. The
configuration shown in the following figure illustrates one method to restrict access to a SCADA server.
In this example, the accept_unknown_host parameter restricts access to the main SCADA server,
SCADA01. Access is restricted to iClients iClient01 and iClient10, and to a second SCADA server,
SCADA02. SCADA02 duplicates the information on SCADA01 so that the Terminal Server, TServer, can
provide the data to remote nodes. However, direct access from the Internet to SCADA01 is not provided.
This feature keeps SCADA01 secure from unauthorized nodes.
For more information about restricting access from remote nodes, refer to the section Disabling Con-
nections from Unauthorized Nodes in the Setting up the Environment manual.
You can also restrict database write access on a node-by-node basis using the accept_unauthorized_
writes parameter in the NETWORK.INI file. When you use this parameter with security areas, database
writes are first restricted by security area and then by node. The following figure illustrates how security
areas interact with the accept_unauthorized_writes parameter.
However, when John logs into iClient01, he can modify the database because the NETWORK.INI file grants
access. Conversely, when Frank logs into iClient01, he cannot modify the database because he does not
have rights to Line 1. Consequently, the SCADA server rejects his request even though he is logged into an
authorized node.
For more information about restricting database write access on a node-by-node basis, refer to the sec-
tion Disabling Database Write Access for Unauthorized Nodes in the Setting up the Environment manual.
A customized screen saver is integrated into the iFIX software. As part of your strategy to secure inactive
computers, you can use the iFIX Screen Saver. This screen saver activates in the same way that other Win-
dows screen savers do, but it also has some features specific to iFIX.
The moment when a screen saver appears is typically referred to as the activation of the screen saver. A
screen saver deactivates once the operator moves the mouse or presses a key on the keyboard.
You can configure the iFIX Screen Saver to perform these tasks when it activates:
You configure the iFIX Screen Saver using the Display option in the Windows Control Panel.
When the iFIX Screen Saver activates, it displays a bitmap image. You can substitute the default bitmap
image, iFIXScreenSaver.bmp, with a different bitmap file, such as one containing a company logo, as long
as the name remains the same. The iFIX Screen Saver is located in the C:\Program Files\Proficy\Proficy
iFIX\local directory. You cannot relocate this file.
IMPORTANT: You should disable screen saver password protection if the iFIX Environment Protection option is
enabled. Password protection requires the entry of Ctrl+Alt+Del; these keys may be disabled if Environment Pro-
tection is enabled, or if security is enabled. Instead, you should use the iFIX Screen Saver Security options to log
out of iFIX when the screen saver activates.
You use the iFIX Screen Saver Settings dialog box, shown in the previous figure, to configure iFIX security
settings.
NOTE: Because Microsoft disabled screen savers for Terminal Server sessions for Windows® Server 2003, the iFIX
Screen Saver does not work on Terminal Server clients for Windows Server 2003.
Using Visual Basic for Applications (VBA), you can write scripts that provide security access and inform-
ation. For example, you can use a script to determine the currently logged in operator and his or her secur-
ity rights. You can also write scripts that let operators log into and out of iFIX. Such scripts let you
customize the login process to your needs.
To learn how to write a script with iFIX security, refer to the Writing Scripts e-book. To learn about specific
VBA methods that access the security system, refer to the iFIX Automation Reference file.
Before you enable the security system, you should create all required group and user accounts. Group
accounts define the security areas and application features available to group members. Likewise, user
accounts define the security areas, application features, and group accounts available to individuals.
By default, iFIX provides sample group and user accounts that you can examine to learn how to create
your own accounts. You can also use the sample accounts to log into iFIX. The following table lists the login
name and password for the sample user accounts. For instructions on logging into iFIX, refer to the Log-
ging in to iFIX Manually section.
When you finish, you can verify your security configuration by logging into iFIX and accessing the applic-
ation features and security areas available to each user account. Also, try to access application features
and security areas that are unavailable to ensure that security denies access.
In Classic view, start the Security Configuration program by clicking the Security Configuration button on
the Application toolbar, as shown in the following figure.
You can close the Security Configuration program by selecting Exit from the File menu in the Security Con-
figuration window.
These tools are available from the Security toolbox, as the following figure shows:
Security Toolbox
After you have configured your security areas, group accounts, and user accounts, you can restrict access
to applications and files on a node and force operators to log into iFIX by enabling security. Once you
enable security, the lock displayed by the Security Configuration program closes to indicate the computer
is protected.
NOTE: If you enable security and set the security path to a folder other than the default, which is the C:\Program
Files\Proficy\Proficy iFIX\Local folder, when you change the node name, security is disabled. You will need to con-
figure iFIX security again and enable it.
If you want to provide complete access to the files on a computer, you can disable security. Typically, you
disable security when you want to create a public node. Once security is disabled, the lock displayed by the
Security Configuration program opens to indicate the computer is unprotected.
Once you complete your security strategy, the next step is to define your security areas and specify a
name for each area. You can define up to 254 security areas, and each name can be up to 20 characters.
iFIX names the first 16 security areas A through P by default. However, you can rename these areas or cre-
ate a new area by clicking the Security Area button on the Security toolbox. After you define a security
area, you can assign it to a group or user account.
l To assign a security area to a database block, open the Database Manager and double-click the
block you want to modify. When the block's dialog box appears, locate the Security Areas list box.
Typically, the list box resides on the Advanced tab. Once you locate the list box, select a line of text
from it and enter the security area you want to assign.
l To assign a security area to a picture or a schedule, open the picture or schedule in the Proficy iFIX
WorkSpace and select Property Window from the View menu (Classic view) or click Property Win-
dow in the Window group on the View tab (Ribbon view). When the Properties window appears,
enter the security area you want to assign to the Security Area property.
l To assign a security area to a recipe, refer to the Creating Recipes manual.
You can create group and user accounts by clicking the Group Accounts button or the User Accounts but-
ton on the Security toolbox and clicking Add, then completing either the Group Profile dialog box or the
User Profile dialog box. In these dialog boxes, you can modify the security areas and application features
assigned to this account. In the User Profile dialog box, you can also modify the group accounts assigned
to this user account, and set the password for this user account.
For a list of application features refer to the Application Features section. For a description of security
areas, refer to the Security Areas section.
The Security Configuration program allows you to enter a login time-out interval when creating a user
account. This interval limits the length of time an operator can remain logged into iFIX. When an operator
attempts to access a restricted application feature or security area after the time interval expires, iFIX logs
out the operator.
With this feature, you can configure iFIX to automatically log out operators who forget to do so at the end
of their shift. For example, assume you want operators logged in for up to eight hours. By entering a time-
out interval of 8:00:00, you instruct iFIX to log out your operators eight hours after they log in. If an oper-
ator exits from all iFIX applications a few minutes early, but does not log out, iFIX logs out the operator
when someone from the next shift runs a program. This forces the current operator to log in with their
own account, and prevents unauthorized access to applications and security areas that were available on
the previous shift.
This feature does not eliminate the need to manually log out when an operator finishes using iFIX, par-
ticularly if you have strict security requirements. If you decide to use this feature, consider it as a safety
mechanism that prevents operators from remaining logged in indefinitely.
As group and user responsibilities change, you may find it necessary to modify accounts.
You can delete group and user accounts that you no longer need. Deleting a user account that auto-
matically logs into iFIX also removes the associated autologin configuration file as well. Refer to the sec-
tion iFIX Automatic Login to learn more about setting up a user account to automatically log in.
You can delete every currently-defined account by selecting the Clear command from the File menu.
When you select this command, the security system:
l Disables itself.
l Deletes all group and user accounts.
l Deletes all automatic login configurations.
l Renames the first 16 security areas A through P and deletes any other named security areas.
l Prompts you to create sample accounts. This prevents you from accidentally locking yourself out of
the Security Configuration program. To be safe, you should always create sample accounts.
If you do not create sample accounts and re-enable security, you cannot exit from the Security Con-
figuration program until you create at least one user account. This feature also helps to prevent you
from accidentally locking yourself out of the Security Configuration program.
NOTE: iFIX does not modify the security and backup paths when you select the Clear command.
Using the Security Configuration program, you can set up iFIX to log in an operator automatically when it
starts up by creating an automatic login configuration. You can create this configuration by specifying the
name of the:
Depending on your security requirements, you may want to create a public account that is available to
everyone in non-critical areas of your process. This account would have no password and would auto-
matically log in when you start iFIX. This account would also provide access to the Proficy iFIX WorkSpace
run-time environment.
By default, the Guest account is installed with iFIX. This account has no password, but is not automatically
logged on.
You can delete any automatic login configuration that you no longer need by selecting the name of the
node you want to remove.
The Security Configuration program allows you to import and export your security configuration. Exporting
the configuration creates a security configuration file, SECURITY.RPT, by default, in the security path. This
file contains the following information:
After you create a security configuration file, you can copy it to another computer and import the data.
Importing a configuration file does one of the following:
l Replaces the existing security configuration with the one defined in the configuration file; or
l Adds any new group and user accounts from the configuration file to the existing security con-
figuration. Any account with a full name or a login name that matches an existing account is
ignored. Also adds any new security areas from the configuration file in the existing security con-
figuration.
By exporting and importing a security configuration, you can cut your development time creating user and
group accounts particularly when you want to create many similar accounts on multiple nodes. For
example, suppose you want to create the same user account on five nodes. Instead of creating same
account five times, you can:
You can avoid this situation by adding a password to each account in the configuration file. When you
import the edited configuration file, the Security Configuration program assigns a password for each user
account you modified.
The following figure shows what part of the configuration file to edit.
The security files that you create reside in a path called the security path. The Security Configuration pro-
gram sets this path to the iFIX Local path by default, but you can change it to any other local or network
path.
Determining the path to specify as the security path depends on your needs. If you want a node to have its
own set of accounts, define a local path. However, if you want to share user and group accounts with
other computers, specify a file server (network) path as the security path.
IMPORTANT: Be aware that when you enter a security path you must have read-write access to the path you des-
ignate. After you enter a path, the Security Configuration program creates lock files (SECLOCK.LCK and
SECLOK2.LCK) allowing you to use the program with read-only access to the security path.
Before you define the path, verify that it exists. If it does, the Security Configuration program prompts you
to copy the files to the new path. If the path does not exist, the following text appears:
Security path invalid or unavailable. Continue?
Click Cancel or the No button to abort the process and create the path you want to use. If you plan to cre-
ate the path later, click the Yes button. The following text appears:
Security Files must be manually copied from oldpath
In addition to the security path, you can define a backup path that contains a copy of the files in the security
path. These files are updated whenever you save a modified security configuration. The configuration is
saved to the security path, as well as the backup path of the machine where you perform the save. If there
are other nodes that share the security path and have the backup path pointing to the local hard drive, the
backup is not performed on those machines.
iFIX uses the files in the backup path when the security path is unavailable. For example, if you define a file
server path as your security path, and the file server becomes inaccessible, iFIX uses the backup path to
allow operators to log in.
Like the security path, iFIX sets the backup path, by default, to the iFIX Local path, but you can change it to
any other local or network path. If you plan on using a network path as your security path, use a local path
for the backup path.
The backup path you specify must exist. Otherwise, the following text appears:
Invalid path specified
Click OK to acknowledge the message and create the path you want to use.
When you enable the global security paths option in the Configuration dialog box (of the Security Con-
figuration application), all iFIX user sessions on a computer share the same security configuration. If you
use iFIX startup profiles created in the Startup Profile Manager, you most likely want to enable this option.
To enable global security paths, select the Use These Paths for All Startup Profiles check box in the Con-
figuration dialog box. The following figure shows an example of the Configuration dialog box with the
global security paths check box highlighted.
For more information on working with Terminal Services, refer to the Using Terminal Server manual. For
more information on the Startup Profile Manager, refer to the Using the Startup Profile Manager chapter in
the Setting up the Environment manual.
You can secure the run-time environment by enabling environment protection from the Proficy iFIX
WorkSpace. Refer to the Run-time Environment Protection section. Once you enable environment pro-
tection, you can choose the specific actions you want to restrict. For example, if you want to restrict all
operators from starting other applications using the system tree, select the Disable Title Bar and Menu
Bar, and Disable Task Switching check boxes.
NOTES:
l Some computer keyboards have special buttons that allow users to directly launch e-mail, searches, or
internet browsers. Because these special buttons could circumvent iFIX environment protection, you may
want to uninstall the software that operates the special buttons.
l For Microsoft Windows 8 and Windows Server 2012, the only on-screen keyboard for use with iFIX and
touch screens is the tabtip keyboard (tabtip.exe). This on-screen keyboard will launch automatically if no
physical keyboard is detected, and if the screen focus is on an edit field in the WorkSpace (when the I-Bar
cursor is displayed in the edit field).
IMPORTANT: To launch the keyboard automatically from iFIX on Windows Server 2012 systems, there is additional
configuration. In the Server Manager, you must install the Desktop Experience feature included in the User Inter-
face and Infrastructure features. (By default, this feature is already enabled in Windows 8). After enabling the fea-
ture and restarting Windows, the on-screen keyboard, tiptap.exe, will be available and will display automatically
when focus is on an edit field in iFIX.
The following table provides other common tasks you may want to restrict operators from, and the options
to do so.
1. Right-click the Start button or taskbar and select Properties. The Taskbar and Start Menu Properties
dialog box opens.
2. Select the Taskbar tab.
3. Clear the Keep the taskbar on top of other windows option.
Be aware of the following when using task switching in Microsoft Windows 8 and Windows Server 2012:
l When you disable task switching on Windows 8 and Server 2012 systems, iFIX disables the Win-
dows shell which includes the task bar, the start menu, the desktop, file and folder access, the
l When iFIX is configured to run as a service and to start automatically, Fix.exe should always be star-
ted before launching WorkSpace.exe to enable the on-screen keyboard functionality. If
WorkSpace.exe is launched without starting iFIX in the user session on a system without a physical
keyboard, the on-screen keyboard will not automatically display when the cursor is in an edit con-
trol or in edit mode.
l For Microsoft Windows 8 and Windows Server 2012, the only supported on-screen keyboard for
use with iFIX and touch screens is the tabtip keyboard (tabtip.exe).
l To launch the keyboard automatically from iFIX on Windows Server 2012 systems, there is addi-
tional configuration. In the Server Manager, you must install the Desktop Experience feature
included in the User Interface and Infrastructure features. (By default, this feature is already
enabled in Windows 8). After enabling the feature and restarting Windows, the on-screen key-
board, tiptap.exe, will be available and will display automatically when focus is on an edit field in
iFIX.
Let's assume you enable environment protection in the Proficy iFIX WorkSpace and you want to provide
John with rights to run Recipe Builder, download control recipes, and task switch between the run-time
environment and the Recipe Builder. To do this, you must assign the following application features to
John's user account:
l Task Switching.
l Recipe Builder Operations Window.
l Recipe Download from Recipe Builder.
Operators can log into iFIX manually or automatically. By logging in, operators identify themselves as iFIX
users and gain access to pictures, recipes, and applications that they are authorized to use. Refer to the fol-
lowing sections for more details:
Operators can log into iFIX manually using the Login program. When the Login program starts, it allows
operators to enter their login name and password.
The Login program gives operators three attempts to enter their login name and password correctly. After
the third unsuccessful attempt, the Login program exits. Operators can try to log in again by restarting the
Login program.
If Windows security is authenticating the login name and password, operators can change their password
after they log in. Windows passwords are case-sensitive.
NOTE: Each time an unsuccessful attempt is made to access the iFIX system, a message is sent to the alarm sys-
tem. If you have configured the Alarm ODBC Service and your relational database, these messages are also writ-
ten to your relational database, and can be included in the audit trail of your process.
1. In Classic view, in the Proficy iFIX WorkSpace, in the Application toolbar, click the Login button.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Login.
2. Enter your login name and password.
3. Click Login.
The steps that follow describe how to change a Windows account password for the logged in user. Secur-
ity must be enabled to perform these steps.
To change the account password:
1. In Classic view, in the Proficy iFIX WorkSpace, in the Application toolbar, click the Login button.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Login.
2. Click Change Password. The Change Windows Password dialog box appears.
NOTE: The Change Password button is only available for Windows user accounts.
Operators can log out of iFIX by exiting all protected iFIX applications, starting the Login program, and click-
ing Logout.
iFIX security generates an audit trail of security-related actions taken by iFIX users. The security audit trail
log file resides in the default iFIX alarm path and has the name format YYMMDD.LOG. For example, the file
031023.LOG contains the audit trail for October 23, 2003. If you have configured the Alarm ODBC Service
and your relational database, iFIX writes these messages to your relational database.
Refer to the Setting up the Environment manual for more information about the iFIX Alarm path.
You can connect iFIX user accounts to Windows user accounts. This allows you to use your existing Win-
dows user accounts for password validation. Both local and domain Windows accounts are supported.
l Case-sensitive passwords.
l Passwords that expire.
l Online password changes.
l Ability to specify minimum password requirements.
l Account lockout.
An operator can log into iFIX by entering his or her Windows user name and password. iFIX sends this
information to Windows for authentication. If the operator's account specifies a Windows domain name,
the user name and password are sent to a Windows domain controller for authentication. If Windows veri-
fies the user name and password, iFIX completes the login process. Otherwise, it logs an error. Refer to
the chapter Using iFIX Security for more information about logging into iFIX.
For information on setting up Windows user accounts for use in iFIX, refer to the section Configuring Win-
dows User Accounts.
There are two basic ways that you can configure iFIX to use your Windows security accounts:
l Configure each account using the iFIX Security Configuration program. Refer to the section Using
the Security Configuration Program.
l Use the Security Synchronizer program to update all your accounts at once. Refer to the section
Using Security Synchronizer.
When you are setting up Windows user accounts for use with iFIX security, you should configure the pass-
words, set account lockout thresholds, and configure the account disabled message. Refer to the following
sections for more details:
One of the benefits of using iFIX with Windows security is that you can set Windows passwords to expire.
To configure the local password expiration policy:
1. In the Control Panel, from the Administrative Tools folder, select the Local Security Policy.
2. From the Local Security Settings window, select Account Policies.
3. From the Account Polices folder, select Password Policy.
4. On the right-side of the window, double-click the Maximum password age.
5. Set the number of days after which passwords expire.
6. Click OK.
When an iFIX user account is connected to a Windows user account, the application developer can set an
account lockout threshold, which prevents a user from accessing the account after he enters the incorrect
user name or password beyond the number of acceptable times. Once the account lockout threshold has
been reached, the account is disabled. For more information on the message displayed for a disabled
account, refer to Configuring the Account Disabled Message in iFIX.
To set the account lockout threshold:
1. From the Administrative Tools folder, select Local Security Policy.
2. Select the Security Settings folder from the folder list in the Local Security Settings dialog box.
3. Select the Account Policies folder.
4. Select the Account Lockout Policies folder.
5. Select Account Lockout Threshold.
6. Select the number of invalid login attempts before the account is disabled.
At run time, when a user logs in or enters an electronic signature, he receives an error if the account has
been disabled. The application developer can configure the message to display, such as a telephone num-
ber or the name of a contact person; otherwise, a general message displays.
To configure the account disabled message:
When you use Windows security in iFIX on computers that do not run Windows Vista or Windows Server
2008, user accounts that need to log in to a machine must have the "Act as Part of the Operating System"
right enabled in the local security policy. On Windows Vista or Windows Server 2008, you do not need to
enable the "Act as Part of the Operating System" right.
NOTE: User accounts that are not used to log in to Windows should not have this right.
1. In the Control Panel, from the Administrative Tools folder, select Local Security Policy.
2. In the Local Security Settings dialog box's folder list, select the Local Policies folder.
3. Select the User Rights Assignment folder.
4. In the Rights list, double-click Act as Part of the Operating System.
5. Add the users you want to have this right to the list.
6. Log out of Windows and log in again for your changes to take effect.
If you are using Windows user names and passwords within iFIX Security, be aware that Windows user
accounts must have the policy "Access this computer from the network" applied under "Local Security Set-
tings". By default, this policy is assigned to the groups "Users" and "Everyone" on the local machine. If the
domain policy overrides the local policy settings by removing these groups, then the Windows user names
and passwords will fail with insufficient rights when trying to log in from iFIX. If domain administrators
wish to restrict this right, then they must do one of the following tasks in order to continue to use Window
user names and passwords within iFIX:
l Create a Domain Group that contains all the Domain Users that will be used within iFIX Security,
add this group to the domain policy "Access this computer from the network", and deploy this policy
to all machines running iFIX.
l Add the Domain Users group to the domain policy "Access this computer from the network", and
then deploy this policy to all machines running iFIX.
To connect your Windows and iFIX user accounts using the iFIX Security Configuration program, follow the
steps below.
1. Create your Windows user accounts locally or on a domain controller. To ensure a secure envir-
onment, do not create any local accounts if you are using domain accounts. For more information
on using a domain controller with Windows, refer to your Windows operating system doc-
umentation.
2. If a user account needs to log in to Windows in addition to iFIX, configure that Windows account
with necessary rights, as described in the section User Accounts that Log in to Windows.
3. Run the iFIX Security Configuration program. In the User Profile dialog box for each iFIX user
account, select Use Windows Security, and enter the Windows user name. If the account is local,
leave the domain field blank; otherwise enter the name of the domain controller.
The user and domain names you enter must match the names used by a Windows user account.
Although iFIX login names can only be six characters for standard iFIX users, iFIX users who have
Windows security enabled can have login names of up to twenty characters.
For information on accessing the Security Configuration program, refer to the section The Security
Configuration Program. For information on creating and modifying iFIX user accounts, refer to the
sections Creating Group and User Accounts and Modifying Group and User Accounts.
The Security Synchronizer is an application that allows you to assign iFIX security privileges to iFIX user
accounts based on a Windows security configuration. This model enables you to use Windows security as
a central source of configuration for both Windows and iFIX user accounts. This centralized security envir-
onment, consequently, assists you in compliance with FDA 21 CFR Part 11.
NOTE: Current iFIX software must be installed and running on the machine using the Security Synchronizer.
Operational Overview
First you create Windows groups for each iFIX privilege you want to assign. This includes iFIX security
areas, application features, and groups. Then you assign Windows users to these Windows groups. The
Synchronizer accesses this Windows account information, and then adds, modifies, and deletes iFIX secur-
ity user accounts based on this information. The Synchronizer modifies only those iFIX security user
You can periodically run the Synchronizer as a background task or you can manually run the Synchronizer.
Refer to Scheduling Security Synchronizer for more details.
NOTE: You must assign the Security Synchronizer application feature to the iFIX user that runs or schedules the
Security Synchronizer.
In addition to being able to run the Synchronizer in a number of configurations, Security Synchronizer also
provides these features:
l Ability to run regardless of whether a user is logged into iFIX, or whether a logged-in user has suf-
ficient iFIX security privileges.
NOTES:
l This feature depends on the system user having Automatic login privileges and the Security Syn-
chronizer application feature assigned.
l If Proficy Change Management is enabled and you want to use the Security Synchronizer: there
must be an iFIX logged-in user, and that logged in user must have sufficient security privileges to
use Proficy Change Management.
l An audit trail that lists all changes made to the iFIX security configuration through the security log
and optionally through alarm messages.
l Added security that prevents you from accidentally running the Synchronizer. This is accomplished
by requiring command line parameters for the program to run, and by requiring the system user to
have the Security Synchronizer application feature assigned.
l A robust set of parameters you can use to customize the command line that runs the Synchronizer.
For example, you can supply a time-out value to any new iFIX user accounts created by the Syn-
chronizer, and you can remove all iFIX user accounts not configured to use Windows security. Refer
to Using the Command Line for more information on command line parameters.
Administrative Considerations
Before running the Synchronizer, you should be aware of the following considerations and potential con-
straints:
The Security Synchronizer maps Windows group names to iFIX security privileges. You assign iFIX security
privileges to users who are members of the Windows groups that represent these privileges. iFIX security
privileges are revoked from users who are not members of Windows groups that represent these priv-
ileges.
1. Reads the current iFIX security configuration to determine the currently-available security areas,
application features, and iFIX group names. These names are used to determine the Windows
group names that represent each iFIX privilege.
2. Determines which Windows users belong to each of the Windows group names.
3. Modifies the user account of the same name in iFIX security for each Windows user account that
belongs to any of the valid group names.
Only iFIX user accounts configured to "Use Windows Security" are modified. The Security Syn-
chronizer makes modifications by assigning the user those privileges that map to the Windows
groups for which they are a member, and deleting privileges that map to Windows groups for
which they are not a member.
4. Creates a new iFIX security user account if the Windows user account name does not match an
existing iFIX security user account. The appropriate iFIX security privileges are applied to the new
account.
5. Removes any iFIX user from the security configuration who is not a member of at least one of the
mapped Windows groups that represent an iFIX privilege.
iFIX users not configured to "Use Windows Security" are removed in this manner only if the /R para-
meter is used in the Security Synchronizer command line. Refer to the Using the Command Line
section for more information on the Security Synchronizer command line.
NOTE: The Autologin user accounts are never removed from the security configuration, regardless of
whether they use Windows security or belong to any Windows groups. If security is enabled, the last user
account to have the Security Configuration application feature assigned to it will not be deleted. Also, if a
user account is currently logged in to iFIX it will not be deleted.
6. Writes an audit trail message to the iFIX security log. The log message includes a record for each
added and deleted iFIX user account, other account modifications, and errors encountered during
processing.
NOTE: These messages can also be sent to the iFIX alarm destinations as text messages. Refer to the Using
the Command Line section for more information.
7. Writes analog and digital values to the iFIX database to indicate the success or failure of the syn-
chronization. Writes are performed in this manner only if one or more of the Node.Tag.Field para-
meters are used in the command line. Refer to the Using the Command Line section for more
information on the Security Synchronizer command line.
You must follow each of these steps to prepare the Security Synchronizer to run. Details for each step fol-
low these summarized steps:
1. Decide the Source of Windows Security Information – Decide whether you want to use domain
security, local node security, or both.
2. Create Windows Users - Create Windows users on the domain or local computer, as decided in the
first step.
The first step you must take in preparing to run the Security Synchronizer is to decide the source of Win-
dows security information. You can create Windows groups in the local computer's security configuration
or on a domain controller. You must determine if the security information should come from a Windows
domain, the local computer, or both. One factor to consider when making this decision is the network con-
figuration at the site where the Security Synchronizer is used.
NOTE: It is important to understand that the source of Windows security information determines where Windows
groups are to be located, not where the Windows user accounts are to be found. Depending on whether local or
domain security groups are used, the members of these Windows groups can be local user accounts, domain user
accounts, or both. Domain groups may only contain domain user accounts, while a local group can contain both
local and domain user accounts.
Create your Windows user accounts locally or on a domain controller. To ensure a secure environment, do
not create any local accounts if you are using domain accounts. For more information on using a domain
controller with Windows, refer to your Windows operating system documentation.
If a user account needs to log in to Windows in addition to iFIX, configure that Windows account with
necessary rights, as described in the section User Accounts that Log in to Windows.
Before using the Security Synchronizer, you must create Windows groups for all iFIX application features,
security areas, and security groups to be assigned to iFIX users. You can use the CreateWindowsGroup
tool to create these groups. Refer to The CreateWindowsGroups Tool for more information on using this
tool.
Once you create Windows groups, you can use the Windows User Manager or a similar Windows security
configuration tool to grant individual membership in the groups to Windows user accounts.
l Configuration Strategy
l Limitations on Global Group Names
You can reduce the number of Windows groups that must be created by grouping iFIX application features
into iFIX security groups. Each iFIX security group can represent a set of application features that apply to
a certain level of user, such as operators or supervisors.
You can then assign Windows users to the Windows group that represents the iFIX security group that rep-
resent their user level, such as "iFIX Security Group - Operators." Assigning users to groups in this manner:
l Eases the configuration process by grouping similar application features into a single security
group.
l Helps you avoid assigning Windows users to every application feature privilege that they are to be
granted.
Because iFIX security prevents an iFIX user from belonging to more than 12 security groups, you may still
need to assign some application feature privileges individually. You should always assign security area
privileges individually, since typically there are more application feature privileges than security areas.
Each Windows group name represents a single iFIX security privilege. An iFIX security privilege can be any
of the following:
Security Area Name – user-defined in the iFIX Security Configuration program. These names have default
letter values of A through P when iFIX is installed.
Windows group names that represent each iFIX privilege are created by combining a prefix string indic-
ating the type of iFIX privilege with the name of the iFIX privilege. There are long and short forms of the
prefix string. The following table shows each type of iFIX privilege and its long and short prefix strings.
The following table shows examples of iFIX privilege names and their corresponding Windows group
names. It is assumed that an iFIX security area named "Plant Floor" and an iFIX security group named
"Supervisors" has been configured in iFIX security for this example.
You must limit the size of each Windows global group name to 20 characters if you synchronize iFIX secur-
ity with Windows security groups that exist on either of the following domains:
Because many iFIX application feature names exceed this limit, to successfully use Security Synchronizer
in this situation, you must do either of the following:
l Use aliases for iFIX application features that exceed 16 characters. Refer to Application Feature
Name Aliases for a complete list of pre-defined Windows group name aliases for application fea-
ture names.
l Use the short prefix strings, described in the Windows Group Names table.
The 20-character limit on the size of the Windows global group name also affects user-defined iFIX secur-
ity groups, which can be up to 30 characters long, and iFIX security area names, which can be up to 20
characters long. If you use the Windows NT 4.0 domain as the source of Windows security information, do
not use more than 16 characters when naming iFIX security areas and iFIX security groups. This technique
reserves four characters for the short prefix strings.
l Windows groups defined on a local computer (also referred to as local groups), since they can be
up to 256 characters long.
l Windows XP domains or Windows 2000 domains with no access by users on systems earlier than
Windows 2000, since global group names on these domains can be up to 64 characters long.
As an alternate solution to the global group name character limitation, you can also use Windows local
groups to contain global groups. You can create local groups with the full application feature names and
you can assign global groups with an arbitrary name to the appropriate local groups.
If you are a Windows user who belongs to the global group, you also belong to the local group that con-
tains the global group. Therefore, you will be assigned the privilege associated with that local group name.
Since creating and maintaining local groups across multiple computers adds complexity to the con-
figuration required to use the Security Synchronizer, you should use this alternate solution only when a
single node is running the Security Synchronizer to synchronize a shared set of security files. If multiple
nodes are running the Security Synchronizer to synchronize multiple copies of the iFIX security data, then
you should use the application feature name aliases with global groups. Refer to Application Feature
Name Aliases for a complete list of pre-defined Windows group name aliases for application feature
names.
CAUTION: If you do not follow these procedures when using Windows NT 4.0 domain security with Security Syn-
chronizer, an incorrect iFIX security configuration based on the Windows configuration may result.
Global Group Nesting Not Supported
The Security Synchronizer does not support nested global groups within a Windows domain. Only user
accounts that belong to a global group are supported. Global groups that are members of other global
groups are ignored. Accounts that belong to the contained global group are not granted the security priv-
ileges associated with the containing global group.
The CreateWindowsGroups tool helps you to quickly create Windows groups that map to iFIX privileges:
l Eliminate typographical errors when creating Windows security groups using the appropriate
names to map to iFIX security privileges.
l Use the correct syntax when creating Windows security groups.
l Create Windows global and local groups, using the appropriate names for iFIX security privileges.
Before using this tool, you must log in to Windows as a member of the Administrators or Account Oper-
ators group on either the local computer or the Windows domain, depending on whether you create the
Windows groups on the local computer or on the domain. However, iFIX does not need to be running to
use this tool.
The following figure shows the CreateWindowsGroups tool. Use the procedures following this figure to
create Windows security groups.
1. Run CreateWindowsGroups.exe from the iFIX directory. A list of Windows group names displays in
a list box. The Windows group names are derived from the current iFIX security configuration,
including the user-configured security group and security area names.
NOTE: Windows group names display in the list box only if you establish all group and security area
names in the Security Configuration program before using the CreateWindowsGroups tool.
2. Select the appropriate filters and prefix style for the Windows groups you wish to create. If you are
creating groups on a Windows NT 4.0 domain, you must select the Show NT 4.0 Names filter.
3. Select the groups you want to create in Windows security from the list box of group names. The list
may include different group names that represent the same iFIX security privileges.
NOTE: Use Ctrl/Click to select multiple group names in the list box. Use Shift/Click to select a range of
group names in the list box.
4. Click Create Local Groups to create the groups currently selected in the list box if you are creating
Windows groups on the local computer.
5. Click Create Domain Groups. The Specify Domain for Group Creation dialog box appears.
6. In the Create Groups on this Domain edit box, specify a domain name, if you are creating Windows
groups on the Windows domain.
7. Click OK.
Once you create the Windows groups that you need, you can assign Windows user accounts to the groups
that correspond to iFIX security privileges. You use the Windows User Manager tool to assign users to
groups that represent the iFIX privileges that they should be granted.
You can run the Security Synchronizer using a node-based or user-based approach to iFIX security.
Node-based Security
Choose this method if you want to run the Security Synchronizer on a node, regardless of who, if anyone,
is logged into iFIX. Using the iFIX security Autologin feature, you must specify an iFIX user account as the
system user. This account is automatically logged in as the system user the next time iFIX is started. You
cannot log this user off unless you remove the associated account from the System User field in the Auto-
matic Login Node dialog box, located in the Security Configuration program and restart iFIX.
NOTE: The system user you create here is recognized only by the Security Synchronizer. Other iFIX features and
programs do not recognize the system user; therefore, this user cannot be used to provide access to any security
privilege other than running the Security Synchronizer.
Refer to the chapter Defining and Assigning Security Privileges for more information on the Security Con-
figuration program.
The user account logged in as a system user must have these two application features to be able to
execute the Security Synchronizer:
System User Login – needed for the user to be logged-in as the system user.
If you follow this method, the Security Synchronizer can run, providing these conditions are true:
l iFIX is running.
l Security Configuration program is not running.
l A user is logged in to Windows.
The Security Synchronizer can run even if a non-system user, such as an operator with limited security
privileges, is logged in. iFIX logs the system user in at startup, and the Security Synchronizer checks for the
system user when it executes.
The iFIX user account specified as the system user is not modified or deleted by Security Synchronizer,
even if the /R parameter is specified. Refer to the Command Line Parameter Errors section for more
information on the run-time parameters. When this iFIX user account is used, its privileges to run the
Security Synchronizer cannot be revoked. Therefore, you should create a separate iFIX user account that
represents the system user with only the necessary security privileges. You should avoid using an existing
iFIX user's account.
NOTE: Once you add a system user to the Autologin configuration, you must restart iFIX for that user to become
logged-in.
User-based Security
To use this method, the currently logged in iFIX user must have the privileges necessary to run the Security
Synchronizer. You must assign the Security Synchronizer application feature to the appropriate user
accounts. If you do not specify a system user in the iFIX Autologin configuration, then, by default, user-
based security is used.
Under user-based security, if the current user does not have the appropriate Security Synchronizer applic-
ation feature privilege or if no user is logged in, the Security Synchronizer does not run and a message is
sent to the audit trail file.
You should run Security Synchronizer from only one location for each set of iFIX security files you maintain.
If all nodes on a company network use a shared set of iFIX security files that are stored on a file server,
Because the Security Synchronizer runs as a background task, you must execute it from a command
prompt window or use a similar method to supply command line parameters to the program.
You cannot start the Security Synchronizer by double-clicking the file in Windows Explorer because you
need to supply command line parameters to start the synchronization process. This inability to launch the
Synchronizer provides added security by preventing you from clicking the program icon in Explorer and ini-
tiating the synchronization process at an inappropriate time, which could lead to an incorrect security con-
figuration.
You can, however, execute the program using an icon you create that contains the appropriate command
line parameters. You can create a Windows shortcut that points to the Security Synchronizer program and
supplies the command line parameters. Use the Shortcut tab of a shortcut to the SecuritySynchronizer.exe
to enter the appropriate information to create your shortcut.
All output that results from running the Security Synchronizer is directed to the security log file. The secur-
ity log file is located in the iFIX Alarm path. Optionally, these messages can be directed to the iFIX alarm
destinations as text messages. Refer to Using the Command Line for more information.
The following figure shows typical messages written to the security log file while the Security Synchronizer
runs. In this example, several users, such as FBROWN and OPERATOR1, configured to use the domain2
domain in the Windows Security configuration, are added to the iFIX security configuration.
You cannot run the iFIX Security Configuration program and the Security Synchronizer at the same time.
The system prevents the two from running simultaneously, which prevents one program from overwriting
changes that the other program is currently trying to make to the security files.
l Check the alarm destinations or security log file for a message indicating this state. An alarm des-
tination can be the alarm history, alarm file, or alarm printers.
l Use the Completion Status tag command line parameter.
Any accounts that do not have the Use Windows Security check box selected in
the iFIX Security User Configuration dialog box will be removed from iFIX secur-
ity with the following exceptions:
l The Application and System User Autologin accounts are not deleted
from iFIX security.
l The user account that is currently logged in is not deleted from iFIX secur-
ity.
/E Supplies the name of an analog iFIX database tag and floating point (F_) field to
Node.Tag.Field which a value is written after the Security Synchronizer completes. The value
written to this tag indicates the most serious error, if any, encountered during
the synchronization process. A value of 0 indicates that no errors were
encountered.
You can determine the specific error encountered by checking the security log
file or the Analog Error tag, specified using the /E parameter.
/C Supplies the name of a digital iFIX database tag and floating point (F_) field to
Node.Tag.Field which a value is written that indicates that the Security Synchronizer has com-
pleted. The value 1 is written when the synchronization has completed.
NOTE: You must manually set this tag's value to 0 before running the Security
Synchronizer if you want to determine whether the process has completed.
/T# seconds Supplies an iFIX Login Time-out value to apply to any new iFIX user accounts cre-
ated by Security Synchronizer.
If you do not use this parameter, the default value of 0 seconds (no Login Time-
out) is used for all new iFIX user accounts.
In iFIX 4.0, 3.5, and 3.0 only the default mapping scheme is valid. The mapping
scheme refers to how Windows group names are mapped to iFIX privileges.
NOTE: This parameter is intended for future use only. Do not use this parameter.
/A Indicates that all messages sent to the security log file should also be sent to the
alarm destinations as text messages. If this parameter is not supplied, most mes-
sages are not sent to the alarm destinations.
A fictitious PlantA domain is used in this example. This command line will:
The command line required by the PlantA domain in this example is:
SecuritySynchronizer.exe /DPlantA /ESCADA1.SYNCERROR.F_CV
The following conditions result because the indicated parameters are not used in the previous command
line example:
l iFIX accounts not using Windows security are not removed because the /R parameter is not used.
l Local Windows security information is ignored because the /L parameter is not used.
l No digital failure value is written to an iFIX database because the /F parameter is not used.
l No completion status value is written to an iFIX database because the /C parameter is not used.
l A default Login Time-out value of 0 seconds is applied to new iFIX user accounts created by the
Security Synchronizer because the /T parameter is not used. This causes time-out to be disabled.
l Messages are not written to the alarm destinations because the /A parameter is not used.
NOTE: You must run the command line while a Windows user is currently logged in to the PlantA domain. Other-
wise, the Security Synchronizer fails because it cannot retrieve the Windows security information.
l Whenever you make changes to the Windows security configuration that affects iFIX users, such as
when you add or remove users from mapped Windows groups.
l After you add, change, or remove iFIX security groups or security area names, as these changes
affect the Windows groups that map to these privileges.
You may want to implement a scheduling strategy if you make frequent changes to the Windows security
configuration that will affect the iFIX security configuration.
The Security Synchronizer application does not have a self-scheduling function, but you can use scheduling
software or a third-party scheduling tool to run the application at specified times or intervals.
iFIX offers a scheduling tool, called the Scheduler, that helps you easily run the Security Synchronizer at
designated times. Refer to the Mastering iFIX manual for details on using this tool.
You can use this service to schedule programs at designated times and intervals.
To use the Windows Task Scheduler:
1. Log in to Windows as a member of the local Administrator group. Only members of this group can
schedule tasks for execution.
2. Ensure that the Task Scheduler service is running by checking the Services dialog box from Control
Panel. The Task Scheduler service displays in the list.
3. Open a command prompt window and type the At command, followed by the appropriate para-
meters to indicate the name of the task and the time of execution. Refer to Windows Help for more
information about the At command and command line parameters used by the Task Scheduler.
4. View the task you scheduled by typing "at" at the command line. Do not supply any parameters. The
list of scheduled tasks displays.
Examples
To schedule the SecuritySynchronizer.exe program to run on a local computer every Monday and Thursday
at 3:00 a.m., you should enter the following command:
at 3:00 /every:M,Th SecuritySynchronizer.exe command line parameters
where <command line parameters> represents the command line parameters to be passed to Secur-
itySynchronizer.exe, such as /L and /R. Refer to Using the Command Line for more information on com-
mand line parameters.
To schedule the SecuritySynchronizer.exe program to run on the 25th day of each month at 6:00 p.m. on a
computer named View3, you should enter the following command:
at\\View3 18:00/next:25 SecuritySynchronizer.exe <command line parameters>
Using an iFIX Database Program Block
You can use an iFIX database Program block to schedule the run time for Security Synchronizer. Due to the
limit on the length of command lines in Program blocks, you must create a Windows command file that
executes from the Program block.
A Windows command file is a text file that contains the command line to run, including the program name
and any command line parameters. The command file must end with the .CMD file extension.
The Windows command file you use must reside in the iFIX root directory (C:\Program Files\Proficy\Proficy
iFIX) if no path is specified on the Program block command line, or you must specify the full path to the file
in the Program block command line.
An example of the text of a command file used to run the Security Synchronizer:
SecuritySynchronizer.exe /DPlantA /L /T /R
An example of a Program block command line that runs the above command file using the Program block's
RUNTASK command if the SecSync.cmd file is in the iFIX base path:
RUNTASK SecSync.cmd
The Security Synchronizer program is a background task that you use with command line parameters to
execute the security synchronization process.
You can also program the synchronization process using the SecuritySynchronizer Automation object. This
object provides the properties and methods you need to synchronize iFIX security with your Windows
security configuration. You have the ability to write custom applications or scripts that automate how and
when the security synchronization process executes.
For a description of the SecuritySynchronizer object and the properties and methods available through it,
see the iFIX Automation Interfaces Help file.
You can use the aliases listed in this section to represent the indicated application feature name. These ali-
ases are provided only for iFIX application feature names that exceed 16 characters. These aliases allow
you to create domain groups without exceeding the 20-character group name limit imposed by the sys-
tems listed above.
The following table lists all application feature name aliases for iFIX.
FAF–AppVal Baselines
Application Validator - Run-time Access FAF–Application Validator - Run-time Access
FAF–AppVal Runtime
Background Task Exit FAF–Background Task Exit
FAF–Ctrl-Alt-Del
Database Manager FAF–Database Manager
Database Reload FAF–Database Reload
Database Save FAF–Database Save
Database Block Add-Delete FAF–Database Block Add-Delete
FAF–ESig-Bypass
Electronic Signature – Perform By FAF–Electronic Signature - Perform By
FAF–ESig-Perform By
Electronic Signature – Verify By FAF–Electronic Signature - Verify By
FAF–ESig-Verify By
Fix32 – Alarm Summary Display FAF–Fix32 - Alarm Summary Display
FAF–F32 - HTDCFG
Fix32 – Historical Trend Display FAF–Fix32 - Historical Trend Display
FAF–F32 - HTD
Fix32 – Historical Trend Display View Only FAF–Fix32 - Historical Trend Display View Only
FAF–F32 - HTDView
Fix32 – Key Macro Editor FAF–Fix32 - Key Macro Editor
Fix32 – Operating System Window FAF–Fix32 - Operating System Window
FAF–F32 - OS Win
Fix32 – Run a Task from View FAF–Fix32 - Run a Task from View
FAF–F32 - RUNTASK
Historical Trend Assign FAF–Historical Trend Assign
FAF–HTA
Historical Trend Collection FAF–Historical Trend Collection
FAF–HTC
Historical Trend Export FAF–Historical Trend Export
FAF–HTD Export
iFIX – System Shutdown FAF–iFIX System Shutdown
FAF–iFIX Shutdown
GE Intelligent Platforms OEM Reserved 1 FAF–GE Intelligent Platforms OEM Reserved 1
FAF–OEM Reserved 1
GE Intelligent Platforms OEM Reserved 10 FAF–GE Intelligent Platforms OEM Reserved 10
FAF–OEM Reserved 10
GE Intelligent Platforms OEM Reserved 11 FAF–GE Intelligent Platforms OEM Reserved 11
FAF–OEM Reserved 11
GE Intelligent Platforms OEM Reserved 12 FAF–GE Intelligent Platforms OEM Reserved 12
FAF–OEM Reserved 12
FAF–OEM Reserved 2
GE Intelligent Platforms OEM Reserved 3 FAF–GE Intelligent Platforms OEM Reserved 3
FAF–OEM Reserved 3
GE Intelligent Platforms OEM Reserved 4 FAF–GE Intelligent Platforms OEM Reserved 4
FAF–OEM Reserved 4
GE Intelligent Platforms OEM Reserved 5 FAF–GE Intelligent Platforms OEM Reserved 5
FAF–OEM Reserved 5
GE Intelligent Platforms OEM Reserved 6 FAF–GE Intelligent Platforms OEM Reserved 6
FAF–OEM Reserved 6
GE Intelligent Platforms OEM Reserved 7 FAF–GE Intelligent Platforms OEM Reserved 7
FAF–OEM Reserved 7
GE Intelligent Platforms OEM Reserved 8 FAF–GE Intelligent Platforms OEM Reserved 8
FAF–OEM Reserved 8
GE Intelligent Platforms OEM Reserved 9 FAF–GE Intelligent Platforms OEM Reserved 9
FAF–OEM Reserved 9
Manual Failover FAF–Manual Failover
Project Backup-Restore FAF–Backup-Restore
FAF–Project Backup-Restore
Recipe Save from Recipe Builder FAF–Recipe Save from Recipe Builder
FAF–RCP Download
Recipe Builder Operations Window FAF–Recipe Builder Operations Window
FAF–RCP Op Window
Recipe Text Output from Recipe Builder FAF–Recipe Text Output from Recipe Builder
FAF–RCP Upload
Recipe Load FAF–Recipe Load
Recipe Save FAF–Recipe Save
Runtime Visual Basic Editor Access FAF–Runtime Visual Basic Editor Access
FAF–Runtime VBE
Security Configuration FAF–Security Configuration
FAF–Security Synch
Startup Profile Manager FAF–Startup Profile Manager
FAF–System Configuration
Tag Group Editor FAF–Tag Group Editor
Enable Task Switching FAF–Task Switching
FAF–WorkSpace Configure
WorkSpace Runtime FAF–WS Runtime
FAF–WorkSpace Runtime
WorkSpace Runtime Exit FAF–WS Runtime Exit
The following table lists all application feature name aliases for Proficy Batch Execution.
Troubleshooting
The following table explains how to address common problems that can arise when using security.
For more information, refer to the iFIX Automation Interfaces Help file.
Want to protect the Start the Security Configuration program, click the Configuration button from
Alt+F4 keystroke. the Security toolbox, and click Enabled from the Configuration dialog box.
Want to access the Start the Proficy iFIX WorkSpace and click the Security Configuration button
Security Configuration from the Application toolbar (Classic view) or on the Applications tab, in the Sys-
program without start- tem & Security group, click Security and then click Security Configuration Utility
ing the SCU. (Ribbon view).
If you see a message that you do not understand when running the Security Configuration program, refer
to the following table for a possible explanation and response. Be sure to click OK to acknowledge the mes-
sage before taking the recommended action.
You may encounter the errors listed in this section in the iFIX alarm destinations or the iFIX security log file
while Security Synchronizer is running. Error codes can range from 0, indicating that no errors have been
detected, to 299.
The error code associated with a specific error is written to the analog error tag, if a valid tag is specified
with the /E parameter. If more than one error occurs during the security synchronization process, then the
most severe error code is written to the analog tag. If more than one error of the same severity is
encountered, then the last error generated of that severity is written to the analog tag.
If an error is encountered while the security synchronization is processing, then the digital error tag is set
to 1.
Error messages that contain user names display the Windows user name in the message. Refer to the fol-
lowing sections for more information about error messages:
Errors are categorized into three levels of severity, listed here from highest to lowest:
User Account Errors – Errors are encountered for individual user accounts, but the synchronization pro-
cess completes. Error codes range from 100-199.
General Errors – Errors such as the inability to write to iFIX database tags are detected, but the syn-
chronization process completes. Error codes range from 1-99.
You may encounter a fourth type of error caused when an invalid command line parameter is passed to
the Security Synchronizer. This type of error does not cause values to be written to the iFIX database, but it
does cause messages to be written to the security log file and the iFIX alarm destinations.
You can configure error conditions to be reported in the Alarm Summary or other alarm destinations
through the use of iFIX database tags. If the /E parameter is used to specify an analog error tag, you can
configure that tag to alarm on the error value. For example, you can configure an Analog Input block that
receives the error value to generate a HI alarm when the error value exceeds 99 or a HIHI alarm when the
error value exceeds 199.
The following table lists the application error codes. These errors cause the Security Synchronizer process
to terminate without performing or completing synchronization. These errors have the highest severity.
The following table lists the user account error codes. These errors are encountered for individual user
accounts, but the synchronization process continues. These errors have medium severity. The %s char-
acter used in the following list of user account error message is replaced by the appropriate string for
each instance of the message:
The following table lists the General Error codes. These errors have the lowest severity.
Values are not associated with command line parameter errors since values are not written to the iFIX
database when these errors occur. These errors terminate the synchronization process before it actually
begins. These errors are detected only when the SecuritySynchronizer.exe program is running, and not
when programming to the Security Synchronizer Automation interface. Refer to the iFIX Automation Inter-
faces Help file for more information on the Automation interface.
You may encounter one of these command line errors while running Security Synchronizer:
The Security Configuration application includes the following dialog boxes (listed in alphabetical order):
The Application Feature Selection dialog box displays the following items:
Authorized
Displays the account privileges accessible to this account.
Available
Displays the account privileges you can assign to the current account.
Add All
Adds all available account privileges to the Authorized list box.
Add
Adds the selected account privilege to the Authorized list box.
Delete
Removes the selected account privilege from the Authorized list box.
Delete All
Removes all available account privileges from the Authorized list box.
The Automatic Login at Startup dialog box displays the following items:
Add
Lets you create an automatic login file for a node.
Modify
Lets you modify an existing automatic login file for the selected node.
Delete
Removes the selected node's automatic login file.
The Automatic Login Node dialog box displays the following items:
Node
Displays the name of the node that automatically logs in the specified application user when iFIX starts. To
change the node name, enter the name of a new node.
Application User
Displays the user account that iFIX automatically logs in as the application user. To change the name, enter
it, or click the browse (...) button to select a name from the Select User dialog box.
System User
Displays the account that is automatically logged in as the system user the next time iFIX is started.
For more information, refer to the Configure iFIX Security topic in the Configuring Security Features guide in
the iFIX electronic books (Dynamics.chm).
NOTE: Only the Security Synchronizer recognizes the System User. Other iFIX features and programs do not recog-
nize the system user; therefore, this user cannot be used to provide access to any security privilege other than run-
ning the Security Synchronizer.
Backup Path
Defines a second path to your security files. By default, iFIX sets the backup path to the local path.
NOTE: If you have defined a file server as your security path, you need to define a backup path.
The Edit Security Area dialog box displays the following items:
Area
Displays the number of the area you chose to edit.
Name
Allows you to create or rename the selected security area. The name you specify can be up to 20 alpha-
numeric characters.
Current Groups
Displays the existing group accounts and lets you select the account you want to modify or delete.
Add
Lets you add a new group account.
Delete
Lets you remove the selected group account.
Authorized
Displays the account privileges accessible to this account.
Available
Displays the account privileges you can assign to the current account.
Add All
Adds all available account privileges to the Authorized list box.
Add
Adds the selected account privilege to the Authorized list box.
Delete
Removes the selected account privilege from the Authorized list box.
Delete All
Removes all available account privileges from the Authorized list box.
Group Name
Displays the name of the group account you are defining. You add or modify the text by typing a name, up
to 30 alphanumeric characters in length.
Application Features
Displays the iFIX application features accessible to this account.
Modify
Lets you add and delete the current account's security areas or application features.
NOTE: If you are creating or editing a user account, the Modify button also lets you add and delete the group
accounts.
The Security Area Naming dialog box displays the following items:
Security Areas
Lists the names of each security area. You can name up to 254 areas.
Modify
Allows you to create or rename the selected security area.
The Security Area Selection dialog box displays the following items:
Available
Displays the account privileges you can assign to the current account.
Add All
Adds all available account privileges to the Authorized list box.
Add
Adds the selected account privilege to the Authorized list box.
Delete
Removes the selected account privilege from the Authorized list box.
Delete All
Removes all available account privileges from the Authorized list box.
Current Users
Displays the existing user accounts and lets you select the account you want to modify or delete.
Add
Lets you add a new user account.
Modify
Lets you modify the selected user account.
Item Description
User Name Displays the full name of the operator whose account you are defining.
You can change the text by typing a new name, up to 30 alphanumeric
characters in length.
Item Description
Full Name Displays the full name of the operator whose account you are defining.
You can change the text by typing a new name, up to 20 alphanumeric
characters in length.
NOTE: The password is not displayed in this field for security reasons.
When you create or modify a password, the field displays an asterisk (*)
for every character you specify.
Login Name Contains the login name of the operator. You can change the text by
entering a new name, up to six alphanumeric characters in length. The
operator enters this name when logging in. If you enable Windows secur-
ity for this account, the login name must match the login name of the
operator's Windows user account.
Group
Displays the group accounts accessible to the current user account.
Security
Displays the security areas accessible to this account.
Application
Displays the iFIX application features accessible to this account.
Modify
Allows you to modify the group accounts, security areas, or application features listed for this user.
How Do I...
For more information on the Security Configuration application, click any of the links below:
Click any of the following links for more information on managing user accounts:
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. On the Security toolbox, click the User Account button.
3. Click Add.
4. In the Full Name field, enter a name for the new user account.
5. Depending on the type of security you want to use, do one of the following:
l If you want to use Windows security, select the Use Windows Security check box, and, in the
Full Name and Domain fields, enter the login name and domain name of the Windows user
account you want to use.
l If you want to use iFIX security, enter the login name and password for the account in the
Login Name and Password fields.
6. If you want to limit the time the operator remains logged into iFIX, in the Login Timeout field, enter a
timeout value.
7. Add group accounts.
8. Add security areas.
9. Add application features.
10. Save the account.
Click any of the following links for more information on selecting account privileges:
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. From the Edit menu, select User Accounts.
3. Double-click the user account in which you want to add or delete application features.
4. On the User Profile dialog box, click Modify from the Application Features list box.
5. To add application features, double-click the ones you want to add from the Available list box. To
add all the application features to the current account, click Add All.
NOTE: Clicking Add All does not add the Electronic Signature – Bypass application feature. You must add
this application feature explicitly.
6. To remove application features, double-click the ones you want to delete from the Authorized list
box. To remove all the application features from the current account, click Delete All.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. From the Edit menu, select User Accounts.
3. Double-click the user account in which you want to add or delete group accounts.
4. On the User Profile dialog box, click Modify from the Group Membership list box.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. On the Security toolbox, click the User Accounts button.
3. Click Add.
4. Enter RECIPE in the Full Name and Login Name fields. Do not assign a password to this account.
5. Click Modify from the Security Area list box.
6. Double-click each security area you want to add from the Available list box. To add all the security
areas to the current account, click Add All.
7. Click OK to save the user account in memory.
8. Click OK to close the User Accounts dialog box.
9. On the File menu, click Save.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. On the Security toolbox, click the User Accounts button.
3. Click Add.
4. Enter PUBLIC in the Full Name field.
5. Enter PUBLIC in the Login Name field.
6. Click OK to save the user account in memory.
7. Click OK to close the User Accounts dialog box.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. On the Security toolbox, click the User Accounts button.
3. Select the user account you want to remove and click Delete. The following text appears:
OK to delete this user?
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. On the File menu, click Clear. The following text appears:
Delete existing security configuration?
3. Click Yes to delete all of your accounts. The following text appears:
Should default user and group accounts be created?
4. Click Yes to create sample group and user accounts or click No to omit this step.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. On the Security toolbox, click the User Accounts button.
3. Double-click the user account you want to modify.
4. Modify the following user account information as needed:
l The account and login names.
l The password (iFIX security only) or the domain name (Windows security only).
l The login timeout value.
l Any group accounts.
l The security areas.
l The application features.
5. Save the user account.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. Create or modify a user account.
3. On the User Profile dialog box, click OK. If you disabled Windows security for the account, and
entered or changed a password, the following text appears in the Password Confirmation dialog
box:
Retype password to confirm changes
4. Enter the password for this account in the field provided, and click OK. If the two passwords match,
security saves the user account in memory. If the passwords do not match, the following message
appears:
Password confirmation failed. Save aborted.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. Click the Group Account button on the Security toolbox.
3. Click Add.
4. In the Group Name field, enter a name for the group account that you want to create.
5. Add security areas.
6. Add application features.
7. Click OK to save the group account in memory.
8. Click OK again to close the Group Accounts dialog box.
9. On the File menu, click Save.
Click any of the following links for more information on adding and deleting account privileges:
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. On the Security toolbox, click the Group Account button.
3. Double-click the group account in which you want to add or delete security areas.
4. On the Group Profile dialog box, click Modify from the Security Area list box.
5. To add security areas, double-click the ones you want to add from the Available list box. To add all
the security areas to the current account, click Add All.
6. To remove security areas, double-click the ones you want to delete from the Authorized list box. To
remove all the security areas from the current account, click Delete All.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. On the Security toolbox, click the Group Account button.
3. Double-click the group account in which you want to add or delete application features.
4. On the Group Profile dialog box, click Modify from the Application Features list box.
5. To add application features, double-click the ones you want to add from the Available list box. To
add all the application features to the current account, click Add All.
NOTE: Clicking Add All does not add the Electronic Signature – Bypass application feature. You must add
this application feature explicitly.
6. To remove application features, double-click the ones you want to delete from the Authorized list
box. To remove all the application features from the current account, click Delete All.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. On the File menu, click Clear. The following text appears:
Delete existing security configuration?
3. Click Yes to delete all of your accounts. The following text appears:
Should default user and group accounts be created?
4. Click Yes to create sample group and user accounts or click No to omit this step.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. On the Security toolbox, click the Group Accounts button.
3. Double-click the group account you want to modify.
4. Modify the following group account information as needed:
l The account name.
l The security areas.
l The application features.
Configuring Security
Click any of the following links for more information on configuring security:
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. On the Security toolbox, click the Configuration button.
3. Double-click the Security Path field and enter the path you want to use.
5. Click Yes to move the security files to the specified path.
6. Double-click the Backup Path field and enter the path you want to use.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. On the Security toolbox, click the Configuration button.
3. Select Enabled to enable security or Disabled to disable security.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. On the Security toolbox, click the Configuration button.
3. Select the Use These Paths for All Startup Profiles check box to enable this option, or clear the
check box to disable it.
4. If you cleared the check box to disable this feature, a dialog box appears. Click OK to continue.
IMPORTANT: For global security paths to work correctly, the Base and Language paths in the SCU's Path
Configuration dialog box must be the same for all users. Project paths can differ, however. To open the
SCU, click the Start button and point to Proficy HMI SCADA - iFIX and then System Configuration. Click the
Path Configuration button to open the Path Configuration dialog box. The default Base path is C:\Program
Files\Proficy\Proficy iFIX, while the default Language path is C:\Program Files\Proficy\Proficy iFIX\NLS.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
5. Click Yes to overwrite the existing file or click No to re-enter a name for the configuration file and
repeat step 3.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. On the File menu, click Import.
IMPORTANT: Be aware that you cannot import a security file exported from another language.
3. Double-click the file you want to import. The following text appears:
Warning: Imported user accounts may not have passwords! Continue?
5. Click Replace to copy the security configuration defined by the import file to the local node, or click
Add to merge the two configurations together. Any account with a user name or a login name that
matches an existing account is ignored.
Click any of the following links for more information on electronic signatures:
The Description Area at the top of the Electronic Signature dialog box contains the details about the action.
The Performed By section fields are active.
To enter an Electronic Signature:
1. In the Electronic Signature dialog box, in the user name field, enter your user name. If your user
account is connected to a Windows user account, enter your Windows user name. Otherwise,
enter your iFIX login name.
TIP: If you are in continuous use mode, the user name field is filled in with the continuous user name. You
can edit this name.
6. Click OK. The electronic signature is validated, the Electronic Signature dialog box closes, the new
value is written to the tag, and a message detailing your action is written to the Electronic Sig-
nature Audit Trail.
NOTE: If your iFIX user account is connected to a Windows user account and you unsuccessfully attempt
to enter your user name or password, your account may be disabled after a certain number of tries. This
number is determined by your Windows security settings.
Once you complete the Performed By section of the Electronic Signature dialog box, the Verified By section
activates. If you have completed the Perform By section, someone else must complete the Verify By sec-
tion.
To verify an action that requires an Electronic Signature:
1. In the Electronic Signature dialog box,, in the user name field, enter your user name. If your user
account is connected to a Windows user account, enter your Windows user name. Otherwise,
enter your iFIX login name.
2. In the password field, enter your password.
3. Optionally, complete the following fields:
Follow these instructions to configure a tag for electronic signature. To ensure a secure signing envir-
onment, you should not edit a current process database with an older-version node.
To configure a tag to require Electronic Signatures:
1. In the iFIX Database Manager, navigate to the Advanced tab of the tag's dialog box.
2. Select the type of electronic signature that you want for this tag:
l None – Do not require Electronic Signatures for this tag at run time. This is the default
option.
l Perform Only – Require a Performed By signature for any changes or alarm acknow-
ledgements to this tag at run time.
l Perform and Verify – Require both a Performed By and a Verified By signature for any
changes or alarm acknowledgements to this tag at run time.
3. Select the options that you want for this tag:
l Allow Continuous Use – Select to allow the operator to repeatedly sign for successive
actions by supplying only a password. Continuous use applies only to the person performing
an action and does not affect the person verifying an action. This is selected by default.
l Exempt Alarm Acknowledgement – Select to allow operators to acknowledge alarms
without entering a signature, even when this tag requires electronic signature for data
entry.
4. Select how you want the tag to handle unsigned writes. Your options are as follows:
l Accept – Accept the unsigned write.
l Log – When an unsigned write is accepted, send a message indicating that the tag accepted
an unsigned write. This option is only available when the tag is configured to accept
unsigned writes.
l Reject – Reject the unsigned write and do not update the database. A message is sent indic-
ating that the tag rejected an unsigned write. (default)
NOTE: You must purchase the Electronic Signature option for these parameters to take effect at run time.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. On the Security toolbox, click the Autologin button.
3. Click Add or double-click the name of the node you want to modify.
4. In the Node field, enter the name of the node you want to configure.
5. In the Application User field, enter the name of the operator you want to log in automatically.
TIP: Click the browse (...) button to select a user from the Select User dialog box.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then click
Security Configuration Utility.
2. On the Security toolbox, click the Autologin button.
3. Select the name of the node you want to remove, and click Delete. The Security Configuration pro-
gram deletes the automatic login file for the selected node.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
1. Log in to Windows as a member of the Administrators or Account Operators group on either the
local computer or the Windows domain.
2. Double-click CreateWindowsGroups.exe in the Proficy iFIX folder. By default, this folder is: C:\Pro-
gram Files\Proficy\Proficy iFIX.
The Create Windows Groups dialog box opens, displaying a list of Windows group names. The
CreateWindowsGroups.exe derives the Windows group names from the current iFIX security con-
figuration.
NOTE: Windows group names display in the list box only if you establish all group and security area
names in the Security Configuration before using the CreateWindowsGroups tool.
3. Select the appropriate filters and prefix style for the Windows groups that you want to create. To
create Windows groups on a Windows NT domain v4.0 or on a Windows 2000 domain controller
with pre-Windows 2000 access support, you must select the Show NT v4.0 Names filter.
4. Select the groups you want to create from the list. The list may include multiple group names that
represent some of the same iFIX security privileges due to the alias names.
5. Press the CTRL key and click to select multiple group names in the list box. Press the SHIFT key and
click to select a range of group names in the list box.
6. If you are creating Windows groups on the local computer as local groups, click the Create Local
Groups button to create the groups currently selected in the list box.
7. If you are creating Windows groups on the Windows domain as global groups, click the Create
Domain Groups... button. The Specify Domain for Group Creation dialog box appears. Specify a
domain name in which to create the groups currently selected in the list.
Once you create Windows groups, you can use the Windows User Manager or a similar Windows
security configuration tool to grant individual membership in the groups to Windows user accounts.
Configure the iFIX Screen Saver using the Display option in the Windows Control Panel.
The Windows Password Protected option relies on the operator's ability to press Ctrl+Alt+Del to log into the
workstation after the screen saver activates. If you configure your Environment Protection settings so that
operators cannot use the Ctrl+Alt+Del key combination, they will not be able to dismiss the iFIX Screen
Saver if the Password Protection option is enabled.
To require a password for dismissing the iFIX Screen Saver, use the options in the iFIX Screen Saver Set-
tings dialog box.
security areas 23
A
Windows groups 45
account disabled message, configuring 35
audit trail 33
account lockout 35
Security Synchronizer messages 46
setting 35
see log file 33
adding 24
Autologin option 38
application features 24
See Also System Autologin option 38
group accounts 24
automatic login configuration 25
security areas 24
creating 25
adding application features to a group
deleting 26
account 80
described 25
adding application features to a user account 75
automatic login file 87
adding group accounts to user accounts 75
aliases 43 C
iFIX application name feature 52
changing the default screen saver bitmap
using for iFIX application features 41 image 18
configuring D
performed by 85 G
restricting access from remote nodes 17
global security paths 28
tracking unsuccessful attempts to access
group accounts 7, 27
iFIX 33
adding to a user account 24
verifying 85
assigning account privileges 5
enabling 29
assigning extra privileges 8
environment protection 29
assigning rights with 8
enabling global security paths 83
creating 24
enabling security 82
deleting 25
environment protection 14
deleting all 25
described 3
described 3
enabling 29
example 3
required application feature 13
modifying 24
error codes 62
sample 21
(1-99) in Security Synchronizer 63
sharing with other computers 27
(100-199) in Security Synchronizer 63
logging in 32
M
logging out 33
messages 58
shutting down 14
account disabled 35
using database program block 50
security configuration (list) 58
iFIX Screen Saver 18
modifying 24
configuring security settings 18
group accounts 24
default bitmap image 19
iFIX security accounts to match Windows
iFIX security 45 security accounts 39
concurrency with Security Synchronizer 46 modifying a group account 81
configuring for Security Synchronizer 45 modifying a user account 77
implementing 20 modifying an automatic login file 87
security strategy 21
N
importing
log file 33
P
description 33
parameter errors in Security Synchronizer 64
login 32
command line 64
automatic 25
passwords 24
manual 32
changing 33
log file for Security Synchronizer 46 record of unsuccessful attempts to log in 33
importing 26 definition 37
access options 2
U
benefits 1
user-based security 2
determining status 4
described 2
tracking database changes 2
user accounts 27
Security toolbox 22
creating 24
creating group accounts 24
creating a recipe 10
creating user accounts 24
creating identical 9
defining a backup path 28
deleting 25
defining a security path 27
deleting all 25
deleting automatic login configuration 26
described 3
modifying group accounts 24
error codes in Security Synchronizer 63
modifying user accounts 24
importing passwords 26
special application features 13
modifying 24
assignment 13
sample 21
special security users in Security
Synchronizer 38 saving 24
VBA 20
securing scripts 15
Windows
abbreviations 41
prefix string 42
Windows groups 41
assigning 45
creating 43
Windows NT 43
Windows security
creating users 41