Configuring Security Features
Configuring Security Features
PROFICY iFIX
HMI/SCADA
Configuring Security Features
Proprietary Notice
The information contained in this publication is believed to be accurate and reliable.
However, GE Vernova assumes no responsibilities for any errors, omissions or
inaccuracies. Information contained in the publication is subject to change without notice.
Trademark Notices
“GE VERNOVA” is a registered trademark of GE Vernova. The terms “GE” and the GE
Monogram are trademarks of the General Electric Company, and are used with permission.
We want to hear from you. If you have any comments, questions, or suggestions about our
documentation, send them to the following email address:
doc@ge.com
Table of Contents
Reference Documents 1
Introduction 2
Security Files 5
User Accounts 6
Group Accounts 7
Assigning Privileges 8
Security Areas 10
Application Features 11
Electronic Signatures 16
Overview of Configuration 19
Domain Caching 42
Operational Overview 44
Administrative Considerations 45
Configuration Strategy 48
Node-based Security 52
User-based Security 53
Examples 57
Trust an Untrusted Certificate while Registering iFIX with Configuration Hub and Proficy Authentic-
ation server 69
Authorized 84
Available 84
Add All 85
Add 85
Delete 85
Delete All 85
Add 85
Modify 85
Delete 85
Node 85
Application User 86
System User 86
Security Path 86
Backup Path 86
Name 87
Current Groups 87
Add 87
Modify 87
Delete 87
Shared Prefix 87
Add Groups 88
Authorized 88
Available 88
Add All 88
Add 88
Delete 88
Delete All 88
Group Name 88
Security Areas 88
Application Features 89
Modify 89
Security Areas 89
Modify 89
Authorized 90
Add All 90
Add 90
Delete 90
Delete All 90
Current Users 90
Add 90
Modify 91
Delete 91
Group 92
Security 92
Application 92
Modify 92
How Do I... 92
Index 111
Configuring Security Features is intended for system administrators who must configure and maintain
security for iFIX® systems. The manual explains the concepts of iFIX security and steps you through
the process of configuring iFIX security.
Reference Documents
For related information about iFIX, refer to the following manuals:
l Understanding iFIX
l Writing Scripts
l Creating Recipes
l Using Electronic Signatures
l Setting Up the Environment
As iFIX monitors your process, it creates data files, such as alarm files; iFIX also modifies and updates
other data, such as the process database. In some companies, access to iFIX applications and data
files is available to everyone. In such an environment, changes to the data files and access to iFIX files
and applications are not critical to the process. However, in other companies these applications and
data are only available to authorized personnel because they are critical to the process.
iFIX provides an integrated security program to assist you in protecting your process. Refer to the fol-
lowing sections for more details:
There are different levels of security that you can implement to protect your process. On one level, you
can control the physical security of your machines and buildings. On another level, you can implement
security for your operating system and your network using firewalls, passwords, and filters.
You can also restrict access to your iFIX applications and files, and protect your data files from unau-
thorized changes, by enabling iFIX security. This manual focuses on iFIX security. iFIX security is
optional and is disabled by default. When you enable iFIX security, you can restrict:
Enabling security also allows you to track all the changes to the process database and forces operators
to log in to iFIX. Logging in requires a login name and an optional password. Depending on your con-
figuration, this data can be the same or separate from your Windows® login name and password. Refer
to the Using iFIX with Windows Security chapter for more information.
iFIX security is user-based, meaning operators cannot access iFIX applications, files, or database
blocks unless you assign access to them. Assigning program, file, or database access to an operator is
commonly referred to as assigning a privilege to that operator.
You can enable security using the Security Configuration program. This program is a flexible and easy-
to-use application that lets you assign operator rights, login names, and passwords. Refer to the Defin-
ing and Assigning Security Privileges chapter for more information
User Account – defines the privileges assigned to one person. iFIX identifies each user account with a
login name and an optional password. User accounts can belong to one or more groups. When a user
account belongs to a group, it inherits all the privileges associated with the group. The user account
can have privileges in addition to the group privileges.
Group Account – assigns access to the most commonly-used privileges that two or more people must
share. Allows you to bundle a set of privileges and assign them in one step to a user account.
Application Feature – a privilege that allows an operator to access specific application functions. For
example, the WorkSpace Runtime application feature provides access to the WorkSpace run-time
environment. To help simplify explanations, this manual collectively refers to applications and spe-
cific application functions as application features.
Security Area – a physical or functional division of a plant. For example, security areas can be process
hardware (such as pumps or ovens), utilities (such as fuel, water, or steam), or maintenance func-
tions.
The following figure shows how user accounts, group accounts, application features, and security areas
interrelate. Each user account has privileges that are directly assigned and inherits any privileges
assigned to the groups to which the user account belongs.
Security Concepts
Electronic Signature – uniquely identifies operators performing or verifying changes to your process.
You can require operators to enter a user name and password before acknowledging an alarm or
entering data. This functionality can assist you in becoming compliant with the 21 CFR Part 11
United States FDA government regulation.
When you initially start the iFIX Security Configuration program, iFIX security is disabled. The Security
Configuration program indicates this status by displaying an open lock on the screen. While security is
disabled, anyone can use iFIX programs or modify iFIX configuration files without restriction. Electronic
signature capability is also disabled when security is disabled.
When you enable security, the lock closes and operators must log into iFIX with their user accounts to
gain access. For instructions on enabling and disabling security, refer to the section Enabling and Dis-
abling Security.
Your main design goal when developing an iFIX security strategy is to create group and user accounts.
Using groups minimizes the amount of work needed to create the accounts while providing you with flex-
ibility and power. For example, instead of creating five operator accounts that all assign the same secur-
ity areas and application features, you can create one group account with these privileges and then
assign the group account to the five operators.
To achieve this goal, assess your operators' needs and identify the common privileges they require.
Once you identify these common privileges, you can create group accounts that provide them.
For example, John, Dave, Tim, and George are all iFIX operators. Their needs are summarized in the fol-
lowing table:
Since each operator requires access to the same application features and security areas, it is possible
to create a group account called Operators that provides these privileges. Once you create the group
account, you can assign it to each operator's user account, as the following figure shows.
Security Files
Using a file server, you can eliminate the need to copy security files to multiple computers. The simplest
way to share your security files is to enter your file server path as the security path. To learn how to
change the security path, refer to the section, Defining the Security Path.
You can set up security without a file server by storing all the security files and the Security Con-
figuration program on each local computer. The security files reside in a path called the security path,
which the Security Configuration program defines.
Security also keeps another copy of the security files in a path called the backup path. Security uses
this path when it cannot find the security path, for example, if the security path becomes unavailable.
Once you set up security and enable it on one computer, you must duplicate the security configuration
on every node. The simplest way to do this is to copy your security files to every computer on your net-
work. For a list of files to copy, refer to the Troubleshooting chapter.
Also, make sure you enable security on every node. Otherwise, security may not function properly.
User Accounts
A user account defines the privileges assigned to one person. iFIX identifies each user account with a
login name and an optional password. User accounts can belong to one or more groups. When a user
account belongs to a group, it inherits all the privileges associated with the group. The user account can
have privileges in addition to the group privileges
When designing a user account, always include the user's full name, login name, and password in your
security plan. If you plan to use Windows security, you should also include the domain name if you plan
to store the user accounts on a domain controller.
Including the user's full name is especially important when you are using electronic signatures, because
the full name is recorded in messages sent to the audit trail for electronic signatures.
Group Accounts
Whenever possible, use group accounts to assign the majority of account privileges. You greatly sim-
plify creating a security configuration if you take the time and effort to assess your operators' needs. If
the security requirements at your site do not warrant such an effort, use the sample group accounts
provided. These accounts provide you with a simpler approach to Configuring Security Features. For
example, the sample group accounts define functional roles in a manufacturing facility. You could easily
create other group accounts, such as those listed in the following table.
Typically, when assigning privileges to an operator, you select the necessary group accounts first. This
assigns common privileges needed by two or more operators doing similar tasks. Then, you can add any
specific privileges an operator may require. Configuring your group and user accounts in this way
provides a modular approach that is easy to maintain.
For example, in the following figure, the group account Operators defines access to the iFIX
WorkSpace run-time environment and specific security areas. These privileges define the common
security rights shared by all operators. If an individual operator needs additional rights, for example, to
enter electronic signatures, you can assign those rights in his or her own user account.
Assigning Privileges
After you create your group accounts, you can assign any remaining privileges to individual user
accounts. These remaining rights should be unique privileges assigned to one person. If, however, you
find that two or more operators require the same privileges, consider creating additional group accounts.
For example, consider the operator accounts for John, Dave, Tim, and George. Assume that George and
Dave need additional privileges to perform electronic signatures and access another security area, while
Tim needs access to the functional security area Ovens. Since Tim is the only operator who requires
access to this security area, you can assign it directly to his user account. However, because both
George and Dave require an extra application feature and security area, you might want to create a
second group account to provide these privileges. This is illustrated in the following figure.
While the best way to maintain flexibility in your security strategy is to define common privileges with
group accounts, you may find it easier not to use them. In general, this happens when you only have to
create a small number of identical user accounts. If you decide not to include group accounts in your
security plan, you can save time creating identical user accounts as described in the following steps.
To create identical user accounts:
Security Areas
You should keep a separate list of security areas as you plan each group and user account. When you
finish, the resulting list contains the names of the security areas you require, allowing you to define your
security areas in one session instead of multiple sessions.
Security areas restrict access to database blocks, operator displays, schedules, and recipes. The fol-
lowing table summarizes the access restrictions provided by security areas.
If someone attempts to change a block's value illegally, security generates a message containing the
login name of the person who attempted the change. iFIX sends this message to the security audit trail
and every enabled alarm destination except the Alarm Summary. To learn more about these messages,
refer to the Implementing Alarms and Messages manual. To learn about the security audit trail, refer to
the Understanding the Security Log File section.
Using the GE recipe package, you can download recipes to a process database. Typically, when secur-
ity is enabled, you can protect the blocks in each process database by assigning them to security areas.
As a result, recipe downloads can fail because the current operator may not have rights to change the
blocks to which the recipe writes.
You can eliminate this problem by creating a recipe user account. This account defines the security
areas to which your recipes can download. When a download begins, iFIX examines the security areas
assigned to the Recipe user account instead of the currently logged in operator.
l Naming it RECIPE.
l Defining the required security areas.
Once you create the account, copy it to the security path of every SCADA server.
IMPORTANT: Security loads the Recipe user account into memory the first time a recipe downloads. If you
modify this account, the local computer continues to use the version in memory. To force the computer to re-
read the new version, log out the current user, log in with the Recipe user account, and log out again.
Be aware that using "RECIPE" as a domain user account is not supported in the iFIX product. If you do
attempt to use RECIPE as a domain user name, you will be able to download a recipe on a SCADA
node, but not on a View node.
Application Features
You should familiarize yourself with the available application features before you design any group or
user account. Very often it is possible to assign an application feature for a specific application function,
such as the iFIX WorkSpace run-time environment, without providing access to the entire application.
The following table lists the available application features.
NOTE: Selecting Add All when you are adding application features to a user or group
The logged-in user needs this if iFIX is running as a service and they log off the
machine.
Enable Task Switch between tasks.
Switching
FIX32 - [Action] Perform a specified action in a FIX Desktop application. Be aware that FIX Desktop
is no longer supported, as of iFIX 5.8.
GE OEM Access an application feature defined by an OEM (Original Equipment Man-
Reserved 1-12 ufacturer). You can provide access for up to 12 OEM application features.
Historical Trend Configure the Classic Historical Assign program.
Assign
Historical Trend Stop the Classic Historian HTC program.
Collection
Historical Trend Legacy application feature that is not used in iFIX.
Export
iFIX - System Shut down iFIX.
Shutdown
Manual Failover Allows you to manually initiate a connection or SCADA failover.
OPC Run the OPC UA Configuration tool on a SCADA Server, or change and save OPC
UA Configuration UA configuration information.
Tool
Project Backup- Back up and restore the iFIX files on the local node.
Restore
Recipe Builder Create master and control recipes, enable and disable the audit trail, assign tag
Development groups to recipes, and scale a batch.
Window
Recipe Builder Modify control recipes and override recipe items within specific limits.
Operations Win-
dow
Recipe Down- Download recipes from the Recipe Builder.
load from Recipe
Builder
Recipe Load Legacy application feature that is not used in iFIX.
Recipe Save Legacy application feature that is not used in iFIX.
Recipe Save Save recipes.
from Recipe
Builder
NOTE: When you assign the Tag Group Editor application feature to a user, you
must also assign the WorkSpace Configure application feature to that same user. If
both these application features are not assigned, the user is considered unau-
thorized for the Tag Group Editor application.
Tag Status View tag staus information.
VisiconX Writes Allow VisconX to do writes.
WorkSpace Con- Switch to the iFIX WorkSpace configuration environment.
figure
WorkSpace Switch to the iFIX WorkSpace run-time environment.
Runtime
WorkSpace Quit the iFIX WorkSpace from the run-time environment.
Runtime Exit
NOTE: Refer to the Batch Execution documentation for more information about the application features spe-
cific to Batch Execution.
Regardless of how you set up your group accounts, you should provide the following application features
on an individual basis:
l Security Configuration
l iFIX - System Shutdown
The Security Configuration application feature should be assigned to your system administrator or the
person in your organization responsible for creating and maintaining iFIX security. In fact, iFIX security
requires you to assign the application feature to at least one user account; providing access to the pro-
gram with a group account does not fulfill this requirement.
The iFIX - System Shutdown and Background Task Exit application features should be assigned to any-
one responsible for shutting down iFIX. If no one is assigned these features, it will be impossible to shut
down iFIX programs in an orderly fashion.
The Enable Ctrl-Alt-Del application feature should be assigned to at least one user if you are planning to
enable Environment Protection. Also, it should be assigned to the user that is logged in when iFIX is con-
figured to run as a service under Windows.
The Enable Task Switching application feature is required for the system administrator.
The iFIX WorkSpace provides a run-time environment. While an operator is in this environment, you
may not want them to:
By enabling environment protection, you restrict operators from performing these actions and provide a
secure run-time environment. For more information on setting up a secured environment, refer to the sec-
tion Restricting Access in the Run-time Environment.
After you configure a secure environment, the iFIX WorkSpace uses your settings as defaults for the
run-time environment. You can set up a user account to override one or more of these settings by assign-
ing certain security features to it.
In general, the rights of the logged-in user will override the Environment Protection settings in the iFIX
WorkSpace User Preferences. An exception to that rule is the Enable ALT+F4 option. If the Disable
One of the options you have when you enable environment protection is to restrict access to the Visual
Basic Editor. If access is not restricted, the editor appears when a compilation error or a run-time error
occurs, allowing you to correct the error.
However, when you restrict access, the iFIX WorkSpace suppresses the Visual Basic Editor even if an
error occurs. Consequently, if you plan to enable this option, your scripts must have error-handling
routines. Otherwise, an error message appears and the script terminates.
In addition to securing scripts, you can also secure pictures and schedules by using the Security Area
property. You can set this property on a picture or schedule using the Property window. For more inform-
ation on properties, refer to the Controlling Object Properties chapter in the Creating Pictures manual.
This property restricts access to a picture or schedule at run-time so that only users with rights to the
specified area can access the pictures and schedules assigned to the security area, as the following fig-
ure shows.
In the Securing Pictures and Schedules figure, notice that John can access the pictures and schedules
in the security area Line 1 because he has rights to it. However, Frank cannot access the area Line 1
because Frank has rights to Line 5 only. If Frank attempts to open a picture or schedule in Line 1, a mes-
sage box appears alerting him of the security violation. The violation is also recorded in the security audit
trail and every enabled alarm destination except the Alarm Summary.
Pictures and schedules that you configure to preload at run-time are also restricted by the security area.
Consequently, if you assign the operator display OVERVIEW.GRF to the security area Line 4 and con-
figure the WorkSpace to load the picture automatically on startup, the picture will not load when John
logs in because he does not have rights to Line 4. Preloading schedules works the same way: the
logged-in user must have rights to the security area of the schedule, or the schedule does not run.
Electronic Signatures
Use electronic signatures to create a more secure environment by requiring that operators electronically
sign for all process changes and alarm acknowledgements. Electronic signatures uniquely identify the
operator making the change, and can require the electronic signature of another person to verify the
change.
Detailed permanent records of operator actions are written to and stored in a relational database. You
can query and report on these records, and then use this data to provide a comprehensive audit trail
detailing the history of your process.
The following application features give user or group accounts electronic signature privileges:
Refer to the Using Electronic Signatures manual for detailed information on using electronic signatures.
Application developers can allow certain operators the ability to write to specific SCADA nodes only.
This prevents the possibility of access from unknown or unauthorized nodes. This is an important fea-
ture to ensure that operators are positioned physically close to the equipment they are manipulating.
By default, iFIX nodes accept connections from any remote node over TCP/IP. You can restrict access
from unknown or unauthorized nodes using the accept_unknown_host parameter in the NETWORK.INI
file. The configuration shown in the following figure illustrates one method to restrict access to a SCADA
server.
In this example, the accept_unknown_host parameter restricts access to the main SCADA server,
SCADA01. Access is restricted to iClients iClient01 and iClient10, and to a second SCADA server,
SCADA02. SCADA02 duplicates the information on SCADA01 so that the Terminal Server, TServer,
can provide the data to remote nodes. However, direct access from the Internet to SCADA01 is not
provided. This feature keeps SCADA01 secure from unauthorized nodes.
For more information about restricting access from remote nodes, refer to the section Disabling Con-
nections from Unauthorized Nodes in the Setting up the Environment manual.
You can also restrict database write access on a node-by-node basis using the accept_unauthorized_
writes parameter in the NETWORK.INI file. When you use this parameter with security areas, database
writes are first restricted by security area and then by node. The following figure illustrates how security
areas interact with the accept_unauthorized_writes parameter.
However, when John logs into iClient01, he can modify the database because the NETWORK.INI file
grants access. Conversely, when Frank logs into iClient01, he cannot modify the database because he
does not have rights to Line 1. Consequently, the SCADA server rejects his request even though he is
logged into an authorized node.
For more information about restricting database write access on a node-by-node basis, refer to the sec-
tion Disabling Database Write Access for Unauthorized Nodes in the Setting up the Environment
manual.
Using Visual Basic for Applications (VBA), you can write scripts that provide security access and inform-
ation. For example, you can use a script to determine the currently logged in operator and his or her
security rights. You can also write scripts that let operators log into and out of iFIX. Such scripts let you
customize the login process to your needs.
To learn how to write a script with iFIX security, refer to the Writing Scripts e-book. To learn about spe-
cific VBA methods that access the security system, refer to the iFIX Automation Reference file.
A customized screen saver is integrated into the iFIX software. You can use the iFIX Screen Saver as
part of your strategy to secure inactive computers. This screen saver activates in the same way that
other Windows screen savers do, but it also has some features specific to iFIX.
The moment when a screen saver appears is typically referred to as the activation of the screen saver. A
screen saver deactivates once the operator moves the mouse or presses a key on the keyboard. When
the iFIX Screen Saver activates, it may display a bitmap image. You can substitute your own bitmap
image, such as one containing a company logo, for the default bitmap image. In the iFIX LOCAL folder,
rename the iFIXScreenSaver.bmp file. Copy your .bmp file into the iFIX LOCAL folder and then rename
it to iFIXScreenSaver.bmp.
You can configure the iFIX Screen Saver to perform these tasks when it activates:
l Terminate the continuous use period. Refer to Allow Continuous Use in the Using Electronic Sig-
natures manual for more details on continuous use.
l Blank out the screen.
l Log out the current iFIX user.
l Prompt for login.
l Log in a specified user.
l Open a specified picture.
NOTE: The screen saver sends all errors to the Windows Event Log. For example, if you have the screen
saver configured to open a specific picture and that picture is unavailable, this error is sent to the Event Log.
To see these errors, start the Window Event Viewer and open the Application log. Screen saver errors have
VB Runtime as their source.
Overview of Configuration
You enable the iFIX Screen Saver in the iFIX SCU in the Local Startup Definition dialog box, as shown
in the following figure.
To configure the iFIX Screen Saver, click the Settings button in the Local Startup Definition dialog box.
This displays the iFIX Screen Saver Settings dialog box, shown in the following figure. Here is where
you configure the majority of your screen saver settings.
Field Description
These set- Click this option to apply the same screen saver settings to all sessions.
tings apply
If the "These Settings Apply to All Sessions" is cleared, then entries entered in
to all ses-
the iFIX Screen Saver Settings dialog box will only apply to the user currently
sions
logged into the operating system at the time those settings are saved.
The iFIX Screen Saver settings are not saved in the SCU file so are applied
regardless of the SCU configuration being used to run iFIX by a Windows user.
Blank out Select this option to make the screen go empty when the screen saver activates.
the screen
Log out of Select this option if you want the user to be logged out of iFIX when the iFIX
iFIX Screen Saver activates. Additionally, you can configure whether the operator is
prompted to log in or a new user is automatically logged in.
After Log- This option is selectable when the Log out of iFIX option is selected. Select this
ging out, option to cause a login dialog box to appear after the screen saver activates. The
Prompt for operator must supply a user name and password.
Login
When the "Log out of iFIX" option is enabled, the screen saver logs a new user
into iFIX only and the Windows session continues to run under the user it was
started with.
After Log- This option is selectable when the Log out of iFIX option is selected. Select this
ging out, option to log in a user automatically after the screen saver activates. To specify
Login this that user, you must supply the user's name and password in the Username and
user Password fields below this option. The screen saver logs a new user into iFIX
only, and the Windows session continues to run under the user it was started
with.
Reset Elec-This option resets the continuous user when the screen saver activates. This
tronic Sig- option only applies if iFIX is running.
nature
Continuous
User
Change This option enables you to specify the iFIX picture to open when the screen saver
this Picture activates.
Open this When you select the Change this Picture option, use this field to specify the new
Picture picture in the Open this picture text box field. This option works only if the
WorkSpace is started and is in Run mode .
Before you enable the security system, you should create all required group and user accounts. Group
accounts define the security areas and application features available to group members. Likewise, user
accounts define the security areas, application features, and group accounts available to individuals.
By default, iFIX provides sample group and user accounts that you can examine to learn how to create
your own accounts. You can also use the sample accounts to log into iFIX. The following table lists the
login name and password for the sample user accounts. For instructions on logging into iFIX, refer to the
Logging in to iFIX Manually section.
When you finish, you can verify your security configuration by logging into iFIX and accessing the applic-
ation features and security areas available to each user account. Also, try to access application features
and security areas that are unavailable to ensure that security denies access.
In Classic view, start the Security Configuration program by clicking the Security Configuration button
on the Application toolbar, as shown in the following figure.
You can close the Security Configuration program by selecting Exit from the File menu in the Security
Configuration window.
These tools are available from the Security toolbox, as the following figure shows:
Security Toolbox
After you have configured your security areas, group accounts, and user accounts, you can restrict
access to applications and files on a node and force operators to log into iFIX by enabling security. Once
you enable security, the lock displayed by the Security Configuration program closes to indicate the
computer is protected.
NOTE: If you enable security and set the security path to a folder other than the default, which is the C:\Pro-
gram Files (x86)\Proficy\iFIX\Local folder, when you change the node name, security is disabled. You will
need to configure iFIX security again and enable it.
If you want to provide complete access to the files on a computer, you can disable security. Typically,
you disable security when you want to create a public node. Once security is disabled, the lock dis-
played by the Security Configuration program opens to indicate the computer is unprotected.
Once you complete your security strategy, the next step is to define your security areas and specify a
name for each area. You can define up to 254 security areas, and each name can be up to 20 characters.
iFIX names the first 16 security areas A through P by default. However, you can rename these areas or
create a new area by clicking the Security Area button on the Security toolbox. After you define a secur-
ity area, you can assign it to a group or user account.
Use the Tag Security Areas drop-down in the Security Area Naming dialog to specify how security areas
assigned to a tag are evaluated when a user writes to a tag or acknowledges a tag’s alarm. There are
two evaluation options:
Once you define the security areas you need, you can use one of the following methods to assign a
security area to a database block, picture, schedule, or recipe:
l To assign a security area to a database block, open the Database Manager and double-click the
block you want to modify. When the block's dialog box appears, locate the Security Areas list
box. Typically, the list box resides on the Advanced tab. Once you locate the list box, select a
line of text from it and enter the security area you want to assign.
l To assign a security area to a picture or a schedule, open the picture or schedule in the iFIX
WorkSpace and select Property Window from the View menu (Classic view) or click Property
Window in the Window group on the View tab (Ribbon view). When the Properties window
appears, enter the security area you want to assign to the Security Area property.
l To assign a security area to a recipe, refer to the Creating Recipes manual.
Use the Tag Security Areas drop-down in the Security Area Naming dialog to specify how security areas
assigned to a tag are evaluated when a user writes to a tag or acknowledges a tag’s alarm. There are
two evaluation options:
l Require At Least One (OR) - Users require access to at least one specified security area.
l Require All (AND) - Users require access to all specified security areas.
NOTE: You must re-start iFIX on the SCADA(s) using that Security Path (as in the case of shared secur-
ity files) for this setting to take effect.
You can create group and user accounts by clicking the Group Accounts button or the User Accounts
button on the Security toolbox and clicking Add, then completing either the Group Profile dialog box or
the User Profile dialog box. In these dialog boxes, you can modify the security areas and application fea-
tures assigned to this account. In the User Profile dialog box, you can also modify the group accounts
assigned to this user account, and set the password for this user account.
For a list of application features refer to the Application Features section. For a description of security
areas, refer to the Security Areas section.
The Security Configuration program allows you to enter a login time-out interval when creating a user
account. This interval limits the length of time an operator can remain logged into iFIX. When an operator
attempts to access a restricted application feature or security area after the time interval expires, iFIX
logs out the operator.
This feature does not eliminate the need to manually log out when an operator finishes using iFIX, par-
ticularly if you have strict security requirements. If you decide to use this feature, consider it as a safety
mechanism that prevents operators from remaining logged in indefinitely.
As group and user responsibilities change, you may find it necessary to modify accounts.
NOTE: Once operators log in, their group and user accounts reside in memory. As a result, changes to group
or user accounts do not take effect until users log out and log in again. By logging in again, the operator
forces iFIX to re-read the account information.
You can delete group and user accounts that you no longer need. Deleting a user account that auto-
matically logs into iFIX also removes the associated autologin configuration file as well. Refer to the sec-
tion iFIX Automatic Login to learn more about setting up a user account to automatically log in.
You can delete every currently-defined account by selecting the Clear command from the File menu.
When you select this command, the security system:
l Disables itself.
l Deletes all group and user accounts.
l Deletes all automatic login configurations.
l Renames the first 16 security areas A through P and deletes any other named security areas.
l Prompts you to create sample accounts. This prevents you from accidentally locking yourself out
of the Security Configuration program. To be safe, you should always create sample accounts.
If you do not create sample accounts and re-enable security, you cannot exit from the Security
Configuration program until you create at least one user account. This feature also helps to pre-
vent you from accidentally locking yourself out of the Security Configuration program.
NOTE: iFIX does not modify the security and backup paths when you select the Clear command.
Using the Security Configuration program, you can set up iFIX to log in an operator automatically when it
starts up by creating an automatic login configuration. You can create this configuration by specifying
the name of the:
Depending on your security requirements, you may want to create a public account that is available to
everyone in non-critical areas of your process. This account would have no password and would auto-
matically log in when you start iFIX. This account would also provide access to the iFIX WorkSpace run-
time environment.
By default, the Guest account is installed with iFIX. This account has no password, but is not auto-
matically logged on.
You can delete any automatic login configuration that you no longer need by selecting the name of the
node you want to remove.
The Security Configuration program allows you to import and export your security configuration. Export-
ing the configuration creates a security configuration file, SECURITY.RPT, by default, in the security
path. This file contains the following information:
After you create a security configuration file, you can copy it to another computer and import the data.
Importing a configuration file does one of the following:
l Replaces the existing security configuration with the one defined in the configuration file; or
l Adds any new group and user accounts from the configuration file to the existing security con-
figuration. Any account with a full name or a login name that matches an existing account is
ignored. Also adds any new security areas from the configuration file in the existing security con-
figuration.
By exporting and importing a security configuration, you can cut your development time creating user
and group accounts particularly when you want to create many similar accounts on multiple nodes. For
example, suppose you want to create the same user account on five nodes. Instead of creating same
account five times, you can:
Exported security configuration files do not include user account passwords in order to protect them.
Similarly, when you import a configuration file, the Security Configuration program creates user
accounts without passwords.
You can avoid this situation by adding a password to each account in the configuration file. When you
import the edited configuration file, the Security Configuration program assigns a password for each user
account you modified.
The following figure shows what part of the configuration file to edit.
To export your security configuration from a command line, use the /X parameter for the Security Con-
figurator (SECCFG.EXE).
The file is created in the iFIX LOCAL folder. If the exported file already exists, it will be overwritten. For
example, the following command will export the security configuration to the file named Secur-
ity080119.RPT in the iFIX LOCAL folder:
SECCFG.EXE /XSecurity080119.RPT
The security files that you create reside in a path called the security path. The Security Configuration pro-
gram sets this path to the iFIX Local path by default, but you can change it to any other local or network
path.
Before you define the path, verify that it exists. If it does, the Security Configuration program prompts
you to copy the files to the new path. If the path does not exist, the following text appears:
Security path invalid or unavailable. Continue?
Click Cancel or the No button to abort the process and create the path you want to use. If you plan to cre-
ate the path later, click the Yes button. The following text appears:
Security Files must be manually copied from oldpath
Click OK to acknowledge the message and copy the security files to the path you specified. If you do
not create the new path or copy the security files to it, you will be unable to restart the Security Con-
figuration program.
In addition to the security path, you can define a backup path that contains a copy of the files in the
security path. These files are updated whenever you save a modified security configuration. The con-
figuration is saved to the security path, as well as the backup path of the machine where you perform the
save. If there are other nodes that share the security path and have the backup path pointing to the local
hard drive, the backup is not performed on those machines.
iFIX uses the files in the backup path when the security path is unavailable. For example, if you define a
file server path as your security path, and the file server becomes inaccessible, iFIX uses the backup
path to allow operators to log in.
Like the security path, iFIX sets the backup path, by default, to the iFIX Local path, but you can change
it to any other local or network path. If you plan on using a network path as your security path, use a local
path for the backup path.
The backup path you specify must exist. Otherwise, the following text appears:
Invalid path specified
Click OK to acknowledge the message and create the path you want to use.
When you enable the global security paths option in the Configuration dialog box (of the Security Con-
figuration application), all iFIX user sessions on a computer share the same security configuration. If you
use iFIX startup profiles created in the Startup Profile Manager, you most likely want to enable this
option. To enable global security paths, select the Use These Paths for All Startup Profiles check box in
the Configuration dialog box. The following figure shows an example of the Configuration dialog box with
the global security paths check box highlighted.
For example, in a Terminal Server environment, enable this option if the default SCU is enabled in the
Startup Profile Manager. If you do not enable global security paths, you will need to individually configure
security within each Terminal Services user session.
IMPORTANT: For global security paths to work correctly, the Base and Language paths in the SCU's Path
Configuration dialog box must be the same for all users. Project paths can differ, however. To open the SCU,
click the Start button, point to Programs, iFIX, and then select System Configuration. Click the Path Con-
figuration button to open the Path Configuration dialog box. The default Base path is C:\Program Files
(x86)\Proficy\iFIX, while the default Language path is C:\Program Files (x86)\Proficy\iFIX\NLS.
For more information on working with Terminal Services, refer to the Using Terminal Server manual. For
more information on the Startup Profile Manager, refer to the Using the Startup Profile Manager chapter
in the Setting up the Environment manual.
You can secure the run-time environment by enabling environment protection from the iFIX WorkSpace.
Refer to the Run-time Environment Protection section. Once you enable environment protection, you
can choose the specific actions you want to restrict.
NOTES:
l Some computer keyboards have special buttons that allow users to directly launch e-mail, searches,
or internet browsers. Because these special buttons could circumvent iFIX environment protection,
you may want to uninstall the software that operates the special buttons.
l For Microsoft Windows 8 and Windows Server 2012, the only on-screen keyboard for use with iFIX
and touch screens is the tabtip keyboard (tabtip.exe). This on-screen keyboard will launch auto-
matically if no physical keyboard is detected, and if the screen focus is on an edit field in the
WorkSpace (when the I-Bar cursor is displayed in the edit field).
IMPORTANT: To launch the keyboard automatically from iFIX on Windows Server 2012 systems, there is
additional configuration. In the Server Manager, you must install the Desktop Experience feature included in
the User Interface and Infrastructure features. (By default, this feature is already enabled in Windows 8). After
enabling the feature and restarting Windows, the on-screen keyboard, tiptap.exe, will be available and will
display automatically when focus is on an edit field in iFIX.
The following table provides other common tasks you may want to restrict operators from, and the
options to do so.
Be aware of the following when using task switching in Microsoft Windows 8 and greater:
l When you disable task switching on Windows 8 and greater, iFIX disables the Windows shell
which includes the task bar, the start menu, the desktop, file and folder access, the Charms bar,
and hot corners that allow access to the Start screen.
l When security is enabled and iFIX is running, a user with task switching rights must be logged in
for the shell to run and the desktop to be accessible. (When security is enabled, the rights of the
logged in user will always take precedence over the environment protection settings configured in
the iFIX WorkSpace User Preferences.) If there is no user logged in, task switching will be dis-
abled, the shell will be disabled, and the system will become inaccessible.
l The Windows shell may be disabled when switching from run to configure mode in iFIX. To avoid
this issue, make sure the logged-in user has both task switching rights and WorkSpace configure
access, so that the desktop is always available in configure mode. The task switching right can
be assigned by adding the Enable Task Switching application feature to the user profile in the
iFIX Security Configuration application. The WorkSpace configure access can be assigned by
adding the WorkSpace Configure application feature to the user profile.
l When a user with task switching rights is logged in, the Taskbar may be displayed on top of the
Workspace. Enable the Auto-Hide the Taskbar property in Windows to push the Taskbar behind
the Workspace.
l If the iFIX WorkSpace is not configured as a startup task in the SCU, you must configure a user
to be logged in automatically who has task switching rights or the desktop will not be available
and the system will become inaccessible when iFIX starts up.
l All users who have iFIX WorkSpace runtime exit privileges must also be assigned task switching
rights or the iFIX WorkSpace runtime shutdown will be blocked.
l When iFIX is configured to run as a service and to start automatically, Fix.exe should always be
started before launching WorkSpace.exe to enable the on-screen keyboard functionality. If
WorkSpace.exe is launched without starting iFIX in the user session on a system without a phys-
ical keyboard, the on-screen keyboard will not automatically display when the cursor is in an edit
control or in edit mode.
NOTE: If these lines are present in the FIX.INI, but are preceded by a semi-colon, remove the semi-
colon to enable the lines.
Let's assume you enable environment protection in the iFIX WorkSpace and you want to provide John
with rights to run Recipe Builder, download control recipes, and task switch between the run-time envir-
onment and the Recipe Builder. To do this, you must assign the following application features to John's
user account:
l Task Switching.
l Recipe Builder Operations Window.
l Recipe Download from Recipe Builder.
These application features override the run-time environment settings and enable John to perform the
specific actions you want.
Operators can log into iFIX manually or automatically. By logging in, operators identify themselves as
iFIX users and gain access to pictures, recipes, and applications that they are authorized to use. Refer
to the following sections for more details:
Operators can log into iFIX manually using the Login program. When the Login program starts, it allows
operators to enter their login name and password.
The Login program gives operators three attempts to enter their login name and password correctly.
After the third unsuccessful attempt, the Login program exits. Operators can try to log in again by restart-
ing the Login program.
If Windows security is authenticating the login name and password, operators can change their pass-
word after they log in. Windows passwords are case-sensitive.
NOTE: Each time an unsuccessful attempt is made to access the iFIX system, a message is sent to the alarm
system. If you have configured the Alarm ODBC Service and your relational database, these messages are
also written to your relational database, and can be included in the audit trail of your process.
1. In Classic view, in the iFIX WorkSpace, in the Application toolbar, click the Login button.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Login.
2. Enter your login name and password.
3. Click Login.
TIP: Other ways you can login to iFIX are from the Options menu in the iFIX Startup window, or the quick
access toolbar in the iFIX WorkSpace in run mode
For more information about synchronizing iFIX security with Windows security, refer to the Using iFIX
with Windows Security chapter.
The steps that follow describe how to change a Windows account password for the logged in user.
Security must be enabled to perform these steps.
To change the account password:
1. In Classic view, in the iFIX WorkSpace, in the Application toolbar, click the Login button.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Login.
2. Click Change Password. The Change Windows Password dialog box appears.
NOTE: The Change Password button is only available for Windows user accounts.
Operators can log out of iFIX by exiting all protected iFIX applications, starting the Login program, and
clicking Logout.
1. In Classic view, in the iFIX WorkSpace, in the Application toolbar, click the Login button.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Login.
2. Click Logout.
TIP: Other ways you can logout of iFIX are from the Options menu in the iFIX Startup window, or the quick
access toolbar in the iFIX WorkSpace in run mode.
iFIX security generates an audit trail of security-related actions taken by iFIX users. The security audit
trail log file resides in the default iFIX alarm path and has the name format YYMMDD.LOG. For example,
the file 031023.LOG contains the audit trail for October 23, 2003. If you have configured the Alarm
ODBC Service and your relational database, iFIX writes these messages to your relational database.
Refer to the Setting up the Environment manual for more information about the iFIX Alarm path.
l Case-sensitive passwords.
l Passwords that expire.
l Online password changes.
l Ability to specify minimum password requirements.
l Account lockout.
An operator can log into iFIX by entering his or her Windows user name and password. iFIX sends this
information to Windows for authentication. If the operator's account specifies a Windows domain name,
the user name and password are sent to a Windows domain controller for authentication. If Windows
verifies the user name and password, iFIX completes the login process. Otherwise, it logs an error.
Refer to the chapter Using iFIX Security for more information about logging into iFIX.
For information on setting up Windows user accounts for use in iFIX, refer to the section Configuring
Windows User Accounts.
There are two basic ways that you can configure iFIX to use your Windows security accounts:
l Configure each account using the iFIX Security Configuration program. Refer to the section
Using the Security Configuration Program.
l Use the Security Synchronizer program to update all your accounts at once. Refer to the section
Using Security Synchronizer.
When you are setting up Windows user accounts for use with iFIX security, you should configure the
passwords, set account lockout thresholds, and configure the account disabled message. Refer to the
following sections for more details:
1. In the Control Panel, from the Administrative Tools folder, select the Local Security Policy.
2. From the Local Security Settings window, select Account Policies.
3. From the Account Polices folder, select Password Policy.
4. On the right-side of the window, double-click the Maximum password age.
5. Set the number of days after which passwords expire.
6. Click OK.
When an iFIX user account is connected to a Windows user account, the application developer can set
an account lockout threshold, which prevents a user from accessing the account after he enters the
incorrect user name or password beyond the number of acceptable times. Once the account lockout
threshold has been reached, the account is disabled. For more information on the message displayed for
a disabled account, refer to Configuring the Account Disabled Message in iFIX.
To set the account lockout threshold:
At run time, when a user logs in or enters an electronic signature, he receives an error if the account has
been disabled. The application developer can configure the message to display, such as a telephone
number or the name of a contact person; otherwise, a general message displays.
To configure the account disabled message:
When you use Windows security in iFIX on computers that do not run Windows Server 2008, user
accounts that need to log in to a machine must have the "Act as Part of the Operating System" right
enabled in the local security policy.
NOTE: User accounts that are not used to log in to Windows should not have this right.
1. In the Control Panel, from the Administrative Tools folder, select Local Security Policy.
2. In the Local Security Settings dialog box's folder list, select the Local Policies folder.
3. Select the User Rights Assignment folder.
4. In the Rights list, double-click Act as Part of the Operating System.
5. Add the users you want to have this right to the list.
6. Log out of Windows and log in again for your changes to take effect.
If you are using Windows user names and passwords within iFIX Security, be aware that Windows user
accounts must have the policy "Access this computer from the network" applied under "Local Security
Settings". By default, this policy is assigned to the groups "Users" and "Everyone" on the local machine.
If the domain policy overrides the local policy settings by removing these groups, then the Windows user
names and passwords will fail with insufficient rights when trying to log in from iFIX. If domain admin-
istrators wish to restrict this right, then they must do one of the following tasks in order to continue to use
Window user names and passwords within iFIX:
l Create a Domain Group that contains all the Domain Users that will be used within iFIX Security,
add this group to the domain policy "Access this computer from the network", and deploy this
policy to all machines running iFIX.
l Add the Domain Users group to the domain policy "Access this computer from the network", and
then deploy this policy to all machines running iFIX.
l Add Authenticated Users to the domain policy "Access this computer from the network", and
then deploy this policy to all machines running iFIX. Be aware that this group requires each user
to log on to the domain at least once to be considered an authenticated user.
l Leave at least the Users group in the domain policy "Access this computer from the network". If
you choose this option, be aware that the Anonymous user and the Guest user are not part of the
Users group.
Be aware that when configuring your Windows users in iFIX Security, the Domain Name entry needs to
be your domain's NetBIOS name.
l NetGetDcName - An older function that iFIX originally used with Network Basic Input/Output
System (NETBIOS) to discover the IP address of the primary domain controller (PDC). This func-
tion does not support DNS-style names, will not detect a backup domain controller (BDC), and is
not recommended when in a Windows environment that uses Domain Name System (DNS) for
name resolution without NETBIOS or a Windows Internet Name Service (WINS) server.
l NetGetAnyDcName - This function returns the name of any domain controller for a domain that
is directly trusted by the specified server. To use this function, the computer must have a trusted
connection with the server.
l DsGetDcName - The default function call made by iFIX security. This function uses Active Dir-
ectory to return the name of a domain controller.
NOTE: If domain logon caching is enabled on the server, be sure that you configure the Interactive logon:
Number of previous logons to cache setting in the Windows security policies to something other than 0. For
example, if the value is 5, the server caches logon information for 5 users. This security policy can be found in
Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options. Domain
caching allows users to log on even when they are not connected to a domain, such as when connected to a
corporate network. Be sure that other security countermeasures are enforced, such as strong passwords, if
this feature is enabled.
Use the secnet.ini file to configure the settings for the name resolution call. You can find this file in the
<iFIX directory>\LOCAL folder.
In the secnet.ini file, the DomainRetrieverCall value can be modified to 0, 1, or 2, which correspond to
one of the following methods:
l 0 - Use NetGetDcName
l 1 -Use NetGetAnyDcName
l 2 - Use DSGetDcName (Default)
The following is an example of the text in the secnet.ini file that sets the Windows API function call. The
example sets the DsGetDcName function (Active Directory) to return the name of a domain controller:
[SECNET]
DomainRetrieverCall=2
NOTE: iFIX reads the secnet.ini file during iFIX startup. If you modify this file, you must restart iFIX for the
changes to be applied. Be aware that if you make any modifications to this file and later upgrade your
iFIX system, you should review your custom settings in the secnet.ini file after the upgrade. Depending on the
date of the modifications, there is a slight chance that you may need to enter your changes again, as the
upgrade process typically overwrites the secnet.ini file with a newer version.
Domain Caching
When iFIX Security is enabled, Domain Caching allows users to log into iFIX even when they are not
connected to a domain, such as when connected to a corporate network. Only the logon information is
persisted (not the full user name, for instance) to comply with Microsoft security policies.
Domain Caching is disabled by default in iFIX. To enable it, you need to update the secnet.ini file in the
iFIX/Local folder. Change the EnableDomainLogonCache setting from 0 to 1, like this:
EnableDomainLogonCache=1
Domain caching should be enabled where ever you want to cache the login. For instance, on the
iFIX Server and iClient (View) nodes.
NOTE: In Microsoft Windows, If domain caching is enabled for logins, be sure that you configure the Inter-
active logon: Number of previous logons to cache setting in the Windows security policies to something other
than 0. For example, if the value is 5, the server caches logon information for 5 users. This security policy can
be found in Computer Configuration > Windows Settings > Security Settings > Local Policies > Security
Options.
For more information on the secnet.ini file and other changes you can make to configure the Windows
API that connects to the domain controller for authentication, refer to the "Control How iFIX Security
Authenticates Windows Accounts" on page 41 topic.
To connect your Windows and iFIX user accounts using the iFIX Security Configuration program, follow
the steps below.
1. Create your Windows user accounts locally or on a domain controller. To ensure a secure envir-
onment, do not create any local accounts if you are using domain accounts. For more information
on using a domain controller with Windows, refer to your Windows operating system doc-
umentation.
2. If a user account needs to log in to Windows in addition to iFIX, configure that Windows account
with necessary rights, as described in the section User Accounts that Log in to Windows.
3. Run the iFIX Security Configuration program. In the User Profile dialog box for each iFIX user
account, select Use Windows Security, and enter the Windows user name. If the account is
local, leave the domain field blank; otherwise enter the name of the domain controller.
The user and domain names you enter must match the names used by a Windows user account.
Although iFIX login names can only be six characters for standard iFIX users, iFIX users who
have Windows security enabled can have login names of up to twenty characters.
For information on accessing the Security Configuration program, refer to the section The Secur-
ity Configuration Program. For information on creating and modifying iFIX user accounts, refer to
the sections Creating Group and User Accounts and Modifying Group and User Accounts.
The Security Synchronizer supports Windows group membership at the local or domain level. Nested
groups within a Windows domain are also supported, which allows for finding of users who are members
of groups within the groups.
NOTE: Current iFIX software must be installed and running on the machine using the Security Synchronizer.
The Security Synchronizer only synchronizes iFIX groups.
Operational Overview
First you create Windows groups for each iFIX privilege you want to assign. This includes iFIX security
areas, application features, and groups. Then you assign Windows users to these Windows groups. The
Synchronizer accesses this Windows account information, and then adds, modifies, and deletes iFIX
security user accounts based on this information. The Synchronizer modifies only those iFIX security
user accounts configured to use Windows security. However, you can configure the Synchronizer to
delete non-Windows users from iFIX. Refer to the /R parameter in the Using the Command Line section
for more information about deleting users.
You can periodically run the Synchronizer as a background task or you can manually run the Syn-
chronizer. Refer to Scheduling Security Synchronizer for more details.
NOTE: You must assign the Security Synchronizer application feature to the iFIX user that runs or schedules
the Security Synchronizer.
In addition to being able to run the Synchronizer in a number of configurations, Security Synchronizer
also provides these features:
l Ability to run regardless of whether a user is logged into iFIX, or whether a logged-in user has suf-
ficient iFIX security privileges.
NOTES:
l This feature depends on the system user having Automatic login privileges and the Security
Synchronizer application feature assigned.
l If Change Management is enabled and you want to use the Security Synchronizer: there must
be an iFIX logged-in user, and that logged in user must have sufficient security privileges to
use Change Management.
l An audit trail that lists all changes made to the iFIX security configuration through the security log
and optionally through alarm messages.
Administrative Considerations
Before running the Synchronizer, you should be aware of the following considerations and potential con-
straints:
l You may schedule the Synchronizer to run at routine intervals. Because you cannot always
determine which user may be logged-in when the Synchronizer runs, you may want to consider
creating a "special" security user that has the appropriate rights and permissions to the Syn-
chronizer. iFIX Security's System Autologin User option can be used to "impersonate" a certain
user when the Synchronizer runs. Refer to the Node-based Security section for information about
using the Autologin feature with Security Synchronizer.
l To ensure that the correct information is accessed when you use domain security, you may want
to consider locating all Windows users in the same domain. If you use domain security in your
configuration, the current Windows user must log in to Windows and the appropriate domain for
the Synchronizer to retrieve the necessary user account information. Inability to access the
domain can result in incomplete configuration information.
NOTE: You do not need access to the domain if you use local security.
l The Security Synchronizer application is not intended to run as a service.
l iFIX security file structure prevents iFIX security users from being members of more than 12 iFIX
security groups at the same time.
l You can assign no more than 20 characters when naming global groups on domain controllers
that are configured to support access by users on systems earlier than Windows 2000.
This restriction affects users who use domain-based Windows security when synchronizing iFIX
security privileges. Because several iFIX security privilege names exceed 20 characters, shorter
aliases are provided for these application features. Refer to the section Application Feature
Name Aliases for a complete list of aliases.
l Be aware that when configuring your Windows users in iFIX Security, the Domain Name entry
needs to be your domain's NetBIOS name.
l When iFIX security is enabled, you must ensure that at least one iFIX user has access to the
iFIX Security Configuration application feature. The system will not delete the last remaining
account with Security Configuration privileges; a message is logged to the audit trail indicating
this situation.
l The Security Synchronizer uses the Windows security configuration as the master or source of
the security data when it runs. Manual changes to a user's security privileges through the iFIX
The Security Synchronizer maps Windows group names to iFIX security privileges. You assign iFIX
security privileges to users who are members of the Windows groups that represent these privileges.
iFIX security privileges are revoked from users who are not members of Windows groups that represent
these privileges.
The Security Synchronizer performs the following steps to synchronize iFIX security users with their
Windows user accounts, based on Windows group memberships:
1. Reads the current iFIX security configuration to determine the currently-available security areas,
application features, and iFIX group names. These names are used to determine the Windows
group names that represent each iFIX privilege.
2. Determines which Windows users belong to each of the Windows group names.
3. Modifies the user account of the same name in iFIX security for each Windows user account that
belongs to any of the valid group names.
Only iFIX user accounts configured to "Use Windows Security" are modified. The Security Syn-
chronizer makes modifications by assigning the user those privileges that map to the Windows
groups for which they are a member, and deleting privileges that map to Windows groups for
which they are not a member.
4. Creates a new iFIX security user account if the Windows user account name does not match an
existing iFIX security user account. The appropriate iFIX security privileges are applied to the
new account.
5. Removes any iFIX user from the security configuration who is not a member of at least one of the
mapped Windows groups that represent an iFIX privilege.
iFIX users not configured to "Use Windows Security" are removed in this manner only if the /R
parameter is used in the Security Synchronizer command line. Refer to the Using the Command
Line section for more information on the Security Synchronizer command line.
NOTE: The Autologin user accounts are never removed from the security configuration, regardless of
whether they use Windows security or belong to any Windows groups. If security is enabled, the last
user account to have the Security Configuration application feature assigned to it will not be deleted.
Also, if a user account is currently logged in to iFIX it will not be deleted.
6. Writes an audit trail message to the iFIX security log. The log message includes a record for each
added and deleted iFIX user account, other account modifications, and errors encountered during
You must follow each of these steps to prepare the Security Synchronizer to run. Details for each step
follow these summarized steps:
1. Decide the Source of Windows Security Information – Decide whether you want to use domain
security, local node security, or both.
2. Create Windows Users - Create Windows users on the domain or local computer, as decided in
the first step.
3. Create Windows Groups – Create Windows groups on the domain or local computer, as decided
in the first step. You can use The CreateWindowsGroups Tool for this step.
4. Assign Users to Windows Groups and Grant Privileges – Assign the Windows groups created in
the previous step to the appropriate Windows user accounts.
5. Configure iFIX Security – Create at least one iFIX account with the appropriate privileges to run
the Security Synchronizer. Ensure that one of these users is logged in when the Security Syn-
chronizer application is running.
NOTE: You must perform this step only if you run Security Synchronizer while security is enabled.
The first step you must take in preparing to run the Security Synchronizer is to decide the source of Win-
dows security information. You can create Windows groups in the local computer's security con-
figuration or on a domain controller. You must determine if the security information should come from a
Windows domain, the local computer, or both. One factor to consider when making this decision is the
network configuration at the site where the Security Synchronizer is used.
NOTE: It is important to understand that the source of Windows security information determines where Win-
dows groups are to be located, not where the Windows user accounts are to be found. Depending on whether
local or domain security groups are used, the members of these Windows groups can be local user accounts,
domain user accounts, or both. Domain groups may only contain domain user accounts, while a local group
can contain both local and domain user accounts.
If a user account needs to log in to Windows in addition to iFIX, configure that Windows account with
necessary rights, as described in the section User Accounts that Log in to Windows.
Before using the Security Synchronizer, you must create Windows groups for all iFIX application fea-
tures, security areas, and security groups to be assigned to iFIX users. You can use the CreateWin-
dowsGroup tool to create these groups. Refer to The CreateWindowsGroups Tool for more information
on using this tool.
Once you create Windows groups, you can use the Windows User Manager or a similar Windows secur-
ity configuration tool to grant individual membership in the groups to Windows user accounts.
l Configuration Strategy
l Limitations on Global Group Names
Configuration Strategy
You can reduce the number of Windows groups that must be created by grouping iFIX application fea-
tures into iFIX security groups. Each iFIX security group can represent a set of application features that
apply to a certain level of user, such as operators or supervisors.
You can then assign Windows users to the Windows group that represents the iFIX security group that
represent their user level, such as "iFIX Security Group - Operators." Assigning users to groups in this
manner:
l Eases the configuration process by grouping similar application features into a single security
group.
l Helps you avoid assigning Windows users to every application feature privilege that they are to
be granted.
Because iFIX security prevents an iFIX user from belonging to more than 12 security groups, you may
still need to assign some application feature privileges individually. You should always assign security
area privileges individually, since typically there are more application feature privileges than security
areas.
Each Windows group name represents a single iFIX security privilege. An iFIX security privilege can be
any of the following:
Security Area Name – user-defined in the iFIX Security Configuration program. These names have
default letter values of A through P when iFIX is installed.
The following table shows examples of iFIX privilege names and their corresponding Windows group
names. It is assumed that an iFIX security area named "Plant Floor" and an iFIX security group named
"Supervisors" has been configured in iFIX security for this example.
You must limit the size of each Windows global group name to 20 characters if you synchronize iFIX
security with Windows security groups that exist on either of the following domains:
Because many iFIX application feature names exceed this limit, to successfully use Security Syn-
chronizer in this situation, you must do either of the following:
l Use aliases for iFIX application features that exceed 16 characters. Refer to Application Feature
Name Aliases for a complete list of pre-defined Windows group name aliases for application fea-
ture names.
l Use the short prefix strings, described in the Windows Group Names table.
The 20-character limit on the size of the Windows global group name also affects user-defined iFIX
security groups, which can be up to 30 characters long, and iFIX security area names, which can be up
to 20 characters long. If you use the Windows NT 4.0 domain as the source of Windows security inform-
ation, do not use more than 16 characters when naming iFIX security areas and iFIX security groups.
This technique reserves four characters for the short prefix strings.
l Windows groups defined on a local computer (also referred to as local groups), since they can be
up to 256 characters long.
As an alternate solution to the global group name character limitation, you can also use Windows local
groups to contain global groups. You can create local groups with the full application feature names and
you can assign global groups with an arbitrary name to the appropriate local groups.
If you are a Windows user who belongs to the global group, you also belong to the local group that con-
tains the global group. Therefore, you will be assigned the privilege associated with that local group
name.
Since creating and maintaining local groups across multiple computers adds complexity to the con-
figuration required to use the Security Synchronizer, you should use this alternate solution only when a
single node is running the Security Synchronizer to synchronize a shared set of security files. If multiple
nodes are running the Security Synchronizer to synchronize multiple copies of the iFIX security data,
then you should use the application feature name aliases with global groups. Refer to Application
Feature Name Aliases for a complete list of pre-defined Windows group name aliases for application fea-
ture names.
CAUTION: If you do not follow these procedures when using Windows NT 4.0 domain security with Security
Synchronizer, an incorrect iFIX security configuration based on the Windows configuration may result.
The CreateWindowsGroups tool helps you to quickly create Windows groups that map to iFIX priv-
ileges:
l Eliminate typographical errors when creating Windows security groups using the appropriate
names to map to iFIX security privileges.
l Use the correct syntax when creating Windows security groups.
l Create Windows global and local groups, using the appropriate names for iFIX security priv-
ileges.
Before using this tool, you must log in to Windows as a member of the Administrators or Account Oper-
ators group on either the local computer or the Windows domain, depending on whether you create the
Windows groups on the local computer or on the domain. However, iFIX does not need to be running to
use this tool.
The following figure shows the CreateWindowsGroups tool. Use the procedures following this figure to
create Windows security groups.
1. Run CreateWindowsGroups.exe from the iFIX directory. A list of Windows group names displays
in a list box. The Windows group names are derived from the current iFIX security configuration,
including the user-configured security group and security area names.
NOTE: Windows group names display in the list box only if you establish all group and security area
names in the iFIX Security Configuration program before using the CreateWindowsGroups tool.
2. Select the appropriate filters and prefix style for the Windows groups you wish to create. If you
are creating groups on a Windows NT 4.0 domain, you must select the Show NT 4.0 Names fil-
ter.
3. Select the groups you want to create in Windows security from the list box of group names. The
list may include different group names that represent the same iFIX security privileges.
NOTE: Use Ctrl/Click to select multiple group names in the list box. Use Shift/Click to select a range of
group names in the list box.
4. Click Create Local Groups to create the groups currently selected in the list box if you are cre-
ating Windows groups on the local computer.
5. Click Create Domain Groups. The Specify Domain for Group Creation dialog box appears.
6. In the Create Groups on this Domain edit box, specify a domain name, if you are creating Win-
dows groups on the Windows domain.
7. Click OK.
You can run the Security Synchronizer using a node-based or user-based approach to iFIX security.
Node-based Security
Choose this method if you want to run the Security Synchronizer on a node, regardless of who, if any-
one, is logged into iFIX. Using the iFIX security Autologin feature, you must specify an iFIX user
account as the system user. This account is automatically logged in as the system user the next time
iFIX is started. You cannot log this user off unless you remove the associated account from the System
User field in the Automatic Login Node dialog box, located in the Security Configuration program and
restart iFIX.
NOTE: The system user you create here is recognized only by the Security Synchronizer. Other iFIX features
and programs do not recognize the system user; therefore, this user cannot be used to provide access to any
security privilege other than running the Security Synchronizer.
Refer to the chapter Defining and Assigning Security Privileges for more information on the Security
Configuration program.
The user account logged in as a system user must have these two application features to be able to
execute the Security Synchronizer:
System User Login – needed for the user to be logged-in as the system user.
If you follow this method, the Security Synchronizer can run, providing these conditions are true:
l iFIX is running.
l Security Configuration program is not running.
l A user is logged in to Windows.
The Security Synchronizer can run even if a non-system user, such as an operator with limited security
privileges, is logged in. iFIX logs the system user in at startup, and the Security Synchronizer checks for
the system user when it executes.
To use this method, the currently logged in iFIX user must have the privileges necessary to run the
Security Synchronizer. You must assign the Security Synchronizer application feature to the appropriate
user accounts. If you do not specify a system user in the iFIX Autologin configuration, then, by default,
user-based security is used.
Under user-based security, if the current user does not have the appropriate Security Synchronizer
application feature privilege or if no user is logged in, the Security Synchronizer does not run and a mes-
sage is sent to the audit trail file.
You should run Security Synchronizer from only one location for each set of iFIX security files you main-
tain. If all nodes on a company network use a shared set of iFIX security files that are stored on a file
server, then only one node on the network should run Security Synchronizer to update the security con-
figuration. If each iFIX node maintains its own set of iFIX security files, then you must run Security Syn-
chronizer on each node in order to update the security configuration for each node.
NOTE: Actions on an iClient node that affect data in the iFIX database require that the iFIX user have the
proper privileges on both the SCADA and View node; this requires that iFIX security configurations are
identical on both nodes. You may want to update all iFIX security configurations using Security Synchronizer
at or near the same time to keep separate security configurations synchronized with each other.
Because the Security Synchronizer runs as a background task, you must execute it from a command
prompt window or use a similar method to supply command line parameters to the program.
You cannot start the Security Synchronizer by double-clicking the file in Windows Explorer because you
need to supply command line parameters to start the synchronization process. This inability to launch
the Synchronizer provides added security by preventing you from clicking the program icon in Explorer
and initiating the synchronization process at an inappropriate time, which could lead to an incorrect
security configuration.
You can, however, execute the program using an icon you create that contains the appropriate com-
mand line parameters. You can create a Windows shortcut that points to the Security Synchronizer pro-
gram and supplies the command line parameters. Use the Shortcut tab of a shortcut to the
SecuritySynchronizer.exe to enter the appropriate information to create your shortcut.
NOTE: The Security Synchronizer only synchronizes iFIX groups.
All output that results from running the Security Synchronizer is directed to the security log file. The
security log file is located in the iFIX Alarm path. Optionally, these messages can be directed to the iFIX
alarm destinations as text messages. Refer to Using the Command Line for more information.
The following figure shows typical messages written to the security log file while the Security Syn-
chronizer runs. In this example, several users, such as FBROWN and OPERATOR1, configured to use
the domain2 domain in the Windows Security configuration, are added to the iFIX security configuration.
You cannot run the iFIX Security Configuration program and the Security Synchronizer at the same time.
The system prevents the two from running simultaneously, which prevents one program from over-
writing changes that the other program is currently trying to make to the security files.
l Check the alarm destinations or security log file for a message indicating this state. An alarm des-
tination can be the alarm history, alarm file, or alarm printers.
l Use the Completion Status tag command line parameter.
/Dname1
/N Supports the processing of nested groups within a Windows domain; finding
users who are members of groups within the groups. For example:
SecuritySynchronizer.exe /D"domain1" /N
/L Indicates that the local computer security configuration where the Windows
groups are located. You must supply either this parameter, or the /D<domain
name> parameter, or both parameters to enable the Security Synchronizer to
locate the Windows groups.
/R Indicates that all iFIX user accounts not configured to use Windows security
will be removed from the security configuration.
Any accounts that do not have the Use Windows Security check box selec-
ted in the iFIX Security User Configuration dialog box will be removed from
iFIX security with the following exceptions:
l The Application and System User Autologin accounts are not deleted
from iFIX security.
l The user account that is currently logged in is not deleted from iFIX
security.
/E Supplies the name of an analog iFIX database tag and floating point (F_) field
Node.Tag.Field to which a value is written after the Security Synchronizer completes. The
value written to this tag indicates the most serious error, if any, encountered
during the synchronization process. A value of 0 indicates that no errors were
encountered.
You can determine the specific error encountered by checking the security
log file or the Analog Error tag, specified using the /E parameter.
/C Supplies the name of a digital iFIX database tag and floating point (F_) field to
Node.Tag.Field which a value is written that indicates that the Security Synchronizer has
completed. The value 1 is written when the synchronization has completed.
If you do not use this parameter, the default value of 0 seconds (no Login
Time-out) is used for all new iFIX user accounts.
In iFIX 4.0, 3.5, and 3.0 only the default mapping scheme is valid. The map-
ping scheme refers to how Windows group names are mapped to iFIX priv-
ileges.
NOTE: This parameter is intended for future use only. Do not use this para-
meter.
/A Indicates that all messages sent to the security log file should also be sent to
the alarm destinations as text messages. If this parameter is not supplied,
most messages are not sent to the alarm destinations.
Command Line Parameter Example
A fictitious PlantA domain is used in this example. This command line will:
The command line required by the PlantA domain in this example is:
SecuritySynchronizer.exe /DPlantA /ESCADA1.SYNCERROR.F_CV
The following conditions result because the indicated parameters are not used in the previous command
line example:
l iFIX accounts not using Windows security are not removed because the /R parameter is not
used.
l Local Windows security information is ignored because the /L parameter is not used.
l No digital failure value is written to an iFIX database because the /F parameter is not used.
l No completion status value is written to an iFIX database because the /C parameter is not used.
l A default Login Time-out value of 0 seconds is applied to new iFIX user accounts created by the
Security Synchronizer because the /T parameter is not used. This causes time-out to be dis-
abled.
l Messages are not written to the alarm destinations because the /A parameter is not used.
NOTE: You must run the command line while a Windows user is currently logged in to the PlantA domain.
Otherwise, the Security Synchronizer fails because it cannot retrieve the Windows security information.
l Whenever you make changes to the Windows security configuration that affects iFIX users,
such as when you add or remove users from mapped Windows groups.
l After you add, change, or remove iFIX security groups or security area names, as these changes
affect the Windows groups that map to these privileges.
You may want to implement a scheduling strategy if you make frequent changes to the Windows secur-
ity configuration that will affect the iFIX security configuration.
The Security Synchronizer application does not have a self-scheduling function, but you can use
scheduling software or a third-party scheduling tool to run the application at specified times or intervals.
iFIX offers a scheduling tool, called the Scheduler, that helps you easily run the Security Synchronizer at
designated times. Refer to the Mastering iFIX manual for details on using this tool.
You may want to consider using the Scheduled Task Wizard located on the Control Panel to schedule
the Security Synchronizer.
You can use this service to schedule programs at designated times and intervals.
To use the Windows Task Scheduler:
1. Log in to Windows as a member of the local Administrator group. Only members of this group can
schedule tasks for execution.
2. Ensure that the Task Scheduler service is running by checking the Services dialog box from Con-
trol Panel. The Task Scheduler service displays in the list.
3. Open a command prompt window and type the At command, followed by the appropriate para-
meters to indicate the name of the task and the time of execution. Refer to Windows Help for
more information about the At command and command line parameters used by the Task Sched-
uler.
4. View the task you scheduled by typing "at" at the command line. Do not supply any parameters.
The list of scheduled tasks displays.
Examples
To schedule the SecuritySynchronizer.exe program to run on a local computer every Monday and
Thursday at 3:00 a.m., you should enter the following command:
at 3:00 /every:M,Th SecuritySynchronizer.exe command line parameters
where <command line parameters> represents the command line parameters to be passed to Secur-
itySynchronizer.exe, such as /L and /R. Refer to Using the Command Line for more information on com-
mand line parameters.
To schedule the SecuritySynchronizer.exe program to run on the 25th day of each month at 6:00 p.m. on
a computer named View3, you should enter the following command:
You can use an iFIX database Program block to schedule the run time for Security Synchronizer. Due to
the limit on the length of command lines in Program blocks, you must create a Windows command file
that executes from the Program block.
A Windows command file is a text file that contains the command line to run, including the program
name and any command line parameters. The command file must end with the .CMD file extension.
The Windows command file you use must reside in the iFIX root directory (C:\Program Files (x86)\Profi-
cy\iFIX) if no path is specified on the Program block command line, or you must specify the full path to
the file in the Program block command line.
An example of the text of a command file used to run the Security Synchronizer:
SecuritySynchronizer.exe /DPlantA /L /T /R
An example of a Program block command line that runs the above command file using the Program
block's RUNTASK command if the SecSync.cmd file is in the iFIX base path:
RUNTASK SecSync.cmd
An example of a Program block command line that runs the above command file using the Program
block's RUNTASK command if the SecSync.cmd file is in the C:\ directory:
RUNTASK C:\SecSync.cmd
The Security Synchronizer program is a background task that you use with command line parameters to
execute the security synchronization process.
You can also program the synchronization process using the SecuritySynchronizer Automation object.
This object provides the properties and methods you need to synchronize iFIX security with your Win-
dows security configuration. You have the ability to write custom applications or scripts that automate
how and when the security synchronization process executes.
For a description of the SecuritySynchronizer object and the properties and methods available through it,
see the iFIX Automation Interfaces Help file.
You can use the aliases listed in this section to represent the indicated application feature name. These
aliases are provided only for iFIX application feature names that exceed 16 characters. These aliases
allow you to create domain groups without exceeding the 20-character group name limit imposed by the
systems listed above.
The following table lists all application feature name aliases for iFIX.
FAF–AppVal Runtime
Background Task Exit FAF–Background Task Exit
FAF–PCM
Data Provider Service FAF–Data Provider Service
Database Manager FAF–Database Manager
Database Reload FAF–Database Reload
Database Save FAF–Database Save
Database Block Add-Delete FAF–Database Block Add-Delete
FAF–ESig-Bypass
Electronic Signature – Perform By FAF–Electronic Signature - Perform By
FAF–ESig-Perform By
Electronic Signature – Verify By FAF–Electronic Signature - Verify By
FAF–ESig-Verify By
Enable Ctrl-Alt-Del FAF–Enable Ctrl-Alt-Del
FAF–Ctrl-Alt-Del
Enable Task Switching FAF–Task Switching
FAF–F32 - HTDCFG
Fix32 – Historical Trend Display FAF–Fix32 - Historical Trend Display
FAF–F32 - HTD
Fix32 – Historical Trend Display View FAF–Fix32 - Historical Trend Display View Only
Only
FAF–F32 - HTDView
FAF–Fix32 - KME
Fix32 – Operating System Window FAF–Fix32 - Operating System Window
FAF–F32 - OS Win
Fix32 – Report Creator FAF-Fix32 Report Creator
FAF-F32 RepCre
Fix32 – Report Generator FAF-Fix32 Report Generator
FAF-F32 RepGen
Fix32 – Run a Task from View FAF–Fix32 - Run a Task from View
FAF–F32 - RUNTASK
GE OEM Reserved 1 FAF–GE OEM Reserved 1
FAF–OEM Reserved 1
GE OEM Reserved 10 FAF–GE OEM Reserved 10
FAF–OEM Reserved 10
GE OEM Reserved 11 FAF–GE OEM Reserved 11
FAF–OEM Reserved 11
GE OEM Reserved 12 FAF–GE OEM Reserved 12
FAF–OEM Reserved 12
GE OEM Reserved 2 FAF–GE OEM Reserved 2
FAF–OEM Reserved 2
GE OEM Reserved 3 FAF–GE OEM Reserved 3
FAF–OEM Reserved 3
GE OEM Reserved 4 FAF–GE OEM Reserved 4
FAF–OEM Reserved 4
GE OEM Reserved 5 FAF–GE OEM Reserved 5
FAF–OEM Reserved 5
GE OEM Reserved 6 FAF–GE OEM Reserved 6
FAF–OEM Reserved 6
GE OEM Reserved 7 FAF–GE OEM Reserved 7
FAF–OEM Reserved 7
GE OEM Reserved 8 FAF–GE OEM Reserved 8
FAF–OEM Reserved 8
GE OEM Reserved 9 FAF–GE OEM Reserved 9
FAF–OEM Reserved 9
Historical Trend Assign FAF–Historical Trend Assign
FAF–HTC
Historical Trend Export FAF–Historical Trend Export
FAF–HTD Export
iFIX – System Shutdown FAF–iFIX System Shutdown
FAF–iFIX Shutdown
Manual Failover FAF–Manual Failover
OPC UA Configuration Tool FAF-OPC UA Configuration Tool
Project Backup-Restore FAF–Backup-Restore
FAF–Project Backup-Restore
Recipe Save from Recipe Builder FAF–Recipe Save from Recipe Builder
FAF–RCP Download
Recipe Builder Operations Window FAF–Recipe Builder Operations Window
FAF–RCP Op Window
Recipe Text Output from Recipe Builder FAF–Recipe Text Output from Recipe Builder
FAF–RCP Upload
Recipe Load FAF–Recipe Load
Recipe Save FAF–Recipe Save
Runtime Visual Basic Editor Access FAF–Runtime Visual Basic Editor Access
FAF–Runtime VBE
Security Configuration FAF–Security Configuration
FAF–Security Config
Security Synchronizer FAF–Security Synchronizer
FAF–Security Synch
Startup Profile Manager FAF–Startup Profile Manager
FAF–System Configuration
Tag Group Editor FAF–Tag Group Editor
Tag Status FAF–Tag Status
VisconX Writes FAF–VisiconX Writes
WorkSpace Configure FAF–WS Configure
FAF–WorkSpace Configure
WorkSpace Runtime FAF–WS Runtime
FAF–WorkSpace Runtime
WorkSpace Runtime Exit FAF–WS Runtime Exit
The following table lists all application feature name aliases for Batch Execution.
Proficy Authentication provides support for mufti-factor authentication. It also provides centralized man-
agement of Proficy users and groups, and a common security model across Proficy products such as
Historian and Operations Hub.
l You want to use a common, multi-factor authentication to log in to iFIX and other Proficy
products, regardless if you are using Configuration Hub.
l You installed iFIX, Configuration Hub, and the Proficy Authentication (UAA) server, and you want
to use Configuration Hub with iFIX .
NOTE:If you are using Windows Server operating system, you must disable Internet Explorer
Enhanced Security Configuration, else it might cause an issue while logging in to iFIX using Proficy
Authentication. This is enabled by default on Windows Servers. Follow the instructions documented
here on the Microsoft web site: FAQ about Internet Explorer Enhanced Security Configuration (ESC).
You can register iFIX with the Proficy Authentication server and log in to iFIX using Proficy Authentic-
ation option. This type of registration is more suitable for the nodes that do not have interaction to Con-
figuration hub. This enables you with a common authorization access that is similar to single sign on
(SSO).
Before you begin to register iFIX to Proficy Authentication server, you must enable security. For more
information, refer to the section "Enabling and Disabling Security " on page 26.
If the connection to the Proficy authentication server is successful, you will receive a success
dialog. If your connection is unsuccessful, retry to connect to another valid Proficy authentication
server.
9. In the Proficy Authentication Credentials, enter the following details:
Field Description
The Proficy Authentication Client Configuration dialog box appears with a success mes-
sage. You can use the security configuration utility in Proficy Authentication and create new
users. For more information, refer to the section "Create Users in Proficy Authentication" on
page 74.
11. Click OK.
The Proficy Authentication Client dialog box is closed leaving the Security Configuration
window open.
12. To save the configuration, in the Security Configuration window, click File, and then click
Save.
The configuration is saved successfully. Now you can close the Security Configuration win-
dow.
By default, ch_admin user is created with the password same as Proficy Authentication secret.
As the next step, you must assign the Group membership to the user. For more information, refer
to the section "Assign iFIX Groups to the Newly Created User" on page 76.
Before you begin: Ensure that you enable Security to log in using Proficy Authentication.
1. In Classic view, in the iFIX WorkSpace, in the Application toolbar, click the Login button.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Login.
2. Select the Proficy Authentication Login check box.
3. Click Login.
4. The Proficy Authentication dialog box appears.
5. Enter the default user name that was created during iFIX registration with Proficy Authentication
and the password same as the Proficy Authentication secret.
6. Click SIGN IN.
7. The iFIX WorkSpace opens.
While you register iFIX with the Proficy Authentication server, if iFIX could not find the Proficy Aau-
thentication server’s root certificate in the local computer’s trusted certificate folder, you can manually
trust the certificate.
1. In the Configure Proficy Authentication window, click the Not trusted link.
The Certificate Details dialog box appears displaying the details of the certificate.
2. If you want to add the certificate to the trusted folder, click Trust.
The certificate is added to the local computer’s trusted certificate folder. You can now proceed
with the iFIX registration with the Proficy Authentication server. For more information, refer to the
section "Registering iFIX with Proficy Authentication Server" on page 66.
3. If you do not trust the certificate, click Don’t Trust.
4. If the certificate details cannot be retrieved due to network issue, you can click the Browse but-
ton and manually locate the certificate in your local machine, and then Trust the certificate.
While you register iFIX with Configuration Hub and Proficy Authentication server and also register (Con-
figuration Hub with Proficy Authentication server in the background), if iFIX could not find Configuration
Hub’s or Proficy Authentication server’s root certificate in the local computer’s trusted certificate folder,
you must manually trust the certificate.
1. In the Configuration Hub Server Registration page, if you want to trust the certificate, click
the Not trusted link.
The Certificate Details dialog box appears displaying the details of the certificate.
2. If you want to add the certificate to the trusted folder, click Trust.
The certificate is added to the local computer’s trusted certificate folder. You can now proceed
with the registration of iFIX with Configuration Hub and Proficy Authentication server and also
register (Configuration Hub with Proficy Authentication server in the background). For more
information, refer to the section Registering iFIX with Configuration Hub, Proficy Authentication
(for SCADA nodes).
4. If the certificate details cannot be retrieved due to network issue, you can click the Browse but-
ton and manually locate the certificate in your local machine, and then Trust the certificate.
NOTES:
Once you delete a group in iFIX, Proficy Authentication will not recognize that the group is deleted in
iFIX. So the Proficy Authentication users in that group will not have the permission to log in to iFIX.
To create a new group and add to Proficy authentication, perform the following:
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and
then click Security Configuration Utility.
3. Click Add.
4. In the Group Name field, enter a name for the group account that you want to create.
NOTE: Ensure that there is no empty space in between the group name. For example, "iFIX
Group1" is not accepted, instead, it can be "iFIX_Group1".
5. Add security areas.
6. Add application features.
For more information on the application features and the security groups, refer to the section
Built-in Application Features and Security Groups in Proficy Authentication.
By default, built in iFIX security groups are added to Proficy Authentication. The following table
describes these groups in iFIX and in Proficy Authentication, and the associated iFIX application fea-
tures that are associated with each group.
NOTE:Once you delete a group in iFIX, Proficy Authentication will not recognize that the group is
deleted in iFIX. So the Proficy Authentication users in that group will not have the permission to use the
associated iFIX application features.
Proficy Authentic-
ation users who
want to directly
log in to iFIX can
use this group.
NOTE: This
group is not avail-
able by default
when you
upgrade from
NOTE: This
group is not avail-
able by default
when you
upgrade from
iFIX 6.1 or 6.5.
You must manu-
ally create the
group with all the
iFIX application
features as
IMPORTANT: If
you want to cre-
ate a new iFIX
security group
that has support
for the all the
new features, at
a minimum, you
need to include
the following fea-
tures:
l Security
Con-
figuration
l System
Con-
figuration
l Database
Block Add-
Delete
l Database
Manager
l Database
Reload
l Database
Save
For information
on how to create
groups in Proficy
Authentication
By default ch_admin user is created after you register iFIX to Proficy Authentication or to Configuration
Hub. For the first time, you can log in to Configuration hub using ch_admin and the password same as
NOTE: The Proficy Authentication user gets only the permissions based on the iFIX group that is
assigned to the user.
3. In Ribbon view, on the Applications tab, in the Configuration Hub group, click .
The Configuration Hub login page opens.
4. Log in to Configuration Hub with the user credentials that were created while you registered iFIX
with Configuration Hub and Proficy authentication server .
5. Go to Security-UAA > Users.
The existing list of Proficy Authentication user accounts appear.
6. Select +.
The Add User screen appears.
7. Enter the following details for the new user account.
Field Description
User Name The user name to log in to Proficy Authentication.
Password The password to log in to Proficy Authentication.
First Name User's first name.
Last Name User's last name.
Email User's email address.
8. Select Add.
Every user/client must possess the following three scopes to access the Security plugin via.
Configuration Hub. If these scopes are not added, then a warning message alerts the user to con-
tact Admin.
Scope Description
uaa.admin This scope indicates that this is a superuser.
This scope resets the Security plugin's admin
clients.write
client secret.
This admin scope enables to change the user
password.
password.write NOTE: This scope is assigned to all the
UAA/LDAP/SAML users by default without
the need to assign manually.
9. Once you create a new user, you must manually assign the iFIX related group membership to the
newly created user. For more information, refer to the section "Assign iFIX Groups to the Newly
Created User" below.
By default, ch_admin user is created after you register iFIX to Proficy Authentication or to Configuration
Hub. For the first time, you can log in to Configuration Hub using ch_admin and the password same as
NOTE: The default iFIX related groups will be listed only after you register iFIX to Proficy
Authentication and Configuration Hub.
5. Select the iFIX related groups as needed.
The users will get the permission based on the group application features assigned in iFIX.
NOTE: If you did not create any specific iFIX groups, you can select the following group mem-
berships, as they will have all the required permissions to use iFIX in Configuration Hub: scada.i-
fix_shared.IFIX_PROFICY_AUTH_ADMIN and scada.project.admin.
6. Select Apply.
The selected group membership is assigned to the user. You can now log out and log in to Con-
figuration Hub and then log in to iFIX using Proficy Authentication.
Troubleshooting
The following table explains how to address common problems that can arise when using security.
For more information, refer to the iFIX Automation Interfaces Help file.
Want to protect the Start the Security Configuration program, click the Configuration button from
Alt+F4 keystroke. the Security toolbox, and click Enabled from the Configuration dialog box.
Want to access the Start the iFIX WorkSpace and click the Security Configuration button from
Security Configuration the Application toolbar (Classic view) or on the Applications tab, in the Sys-
program without starting tem & Security group, click Security and then click Security Configuration
the SCU. Utility (Ribbon view).
If you see a message that you do not understand when running the Security Configuration program, refer
to the following table for a possible explanation and response. Be sure to click OK to acknowledge the
message before taking the recommended action.
You may encounter the errors listed in this section in the iFIX alarm destinations or the iFIX security log
file while Security Synchronizer is running. Error codes can range from 0, indicating that no errors have
been detected, to 299.
If an error is encountered while the security synchronization is processing, then the digital error tag is set
to 1.
Error messages that contain user names display the Windows user name in the message. Refer to the
following sections for more information about error messages:
Errors are categorized into three levels of severity, listed here from highest to lowest:
User Account Errors – Errors are encountered for individual user accounts, but the synchronization
process completes. Error codes range from 100-199.
General Errors – Errors such as the inability to write to iFIX database tags are detected, but the syn-
chronization process completes. Error codes range from 1-99.
You may encounter a fourth type of error caused when an invalid command line parameter is passed to
the Security Synchronizer. This type of error does not cause values to be written to the iFIX database,
but it does cause messages to be written to the security log file and the iFIX alarm destinations.
You can configure error conditions to be reported in the Alarm Summary or other alarm destinations
through the use of iFIX database tags. If the /E parameter is used to specify an analog error tag, you can
configure that tag to alarm on the error value. For example, you can configure an Analog Input block that
receives the error value to generate a HI alarm when the error value exceeds 99 or a HIHI alarm when
the error value exceeds 199.
The following table lists the application error codes. These errors cause the Security Synchronizer pro-
cess to terminate without performing or completing synchronization. These errors have the highest
severity.
The following table lists the user account error codes. These errors are encountered for individual user
accounts, but the synchronization process continues. These errors have medium severity. The %s char-
acter used in the following list of user account error message is replaced by the appropriate string for
each instance of the message:
The following table lists the General Error codes. These errors have the lowest severity.
Values are not associated with command line parameter errors since values are not written to the iFIX
database when these errors occur. These errors terminate the synchronization process before it actually
begins. These errors are detected only when the SecuritySynchronizer.exe program is running, and not
when programming to the Security Synchronizer Automation interface. Refer to the iFIX Automation
Interfaces Help file for more information on the Automation interface.
You may encounter one of these command line errors while running Security Synchronizer:
The Security Configuration application includes the following dialog boxes (listed in alphabetical order):
The Application Feature Selection dialog box displays the following items:
Authorized
Displays the account privileges accessible to this account.
Available
Displays the account privileges you can assign to the current account.
Add
Adds the selected account privilege to the Authorized list box.
Delete
Removes the selected account privilege from the Authorized list box.
Delete All
Removes all available account privileges from the Authorized list box.
The Automatic Login at Startup dialog box displays the following items:
Add
Lets you create an automatic login file for a node.
Modify
Lets you modify an existing automatic login file for the selected node.
Delete
Removes the selected node's automatic login file.
The Automatic Login Node dialog box displays the following items:
Node
Displays the name of the node that automatically logs in the specified application user when iFIX starts.
To change the node name, enter the name of a new node.
System User
Displays the account that is automatically logged in as the system user the next time iFIX is started.
For more information, refer to the Configure iFIX Security topic in the Configuring Security Features
guide in the iFIX electronic books (Dynamics.chm).
NOTE: Only the Security Synchronizer recognizes the System User. Other iFIX features and programs do not
recognize the system user; therefore, this user cannot be used to provide access to any security privilege
other than running the Security Synchronizer.
Security Path
Defines the path to your security files. By default, iFIX sets the security path to the Local path.
NOTE: If you define a file server directory as your security path, you also need to define a backup path. The
backup path allows operators to log into iFIX while the file server is unavailable. The backup path and should
be a local drive.
Backup Path
Defines a second path to your security files. By default, iFIX sets the backup path to the local path.
NOTE: If you have defined a file server as your security path, you need to define a backup path.
The Edit Security Area dialog box displays the following items:
Name
Allows you to create or rename the selected security area. The name you specify can be up to 20 alpha-
numeric characters.
Current Groups
Displays the existing group accounts and lets you select the account you want to modify or delete.
Add
Lets you add a new group account.
Modify
Lets you modify the selected group account.
Delete
Lets you remove the selected group account.
Shared Prefix
Lets you to add scada.ifix_shared in the prefix of the name of the group that you created. For example,
if you created a group called iFIX_Group1 in iFIX, the group is added as scada.ifix_shared.iFIX_
Group1. The Shared Prefix essentially saves you from having to add the same groups from each
iFIX node in the system; you only need to add it once to Proficy Authentication.
Lets you to add <scada>.nodename in the prefix of the name of the group that you created. For
example, if the node name is FIX, and the group name you created in iFIX is iFIX_Group1, the group is
added as scada.FIX.iFIX_Group1. The Node Name Prefix enables you to use the same group names
across different nodes but with different privileges.
Lets you to add the created group along with the preferred prefix to the Proficy Authentication server.
Authorized
Displays the account privileges accessible to this account.
Available
Displays the account privileges you can assign to the current account.
Add All
Adds all available account privileges to the Authorized list box.
Add
Adds the selected account privilege to the Authorized list box.
Delete
Removes the selected account privilege from the Authorized list box.
Delete All
Removes all available account privileges from the Authorized list box.
Group Name
Displays the name of the group account you are defining. You add or modify the text by typing a name,
up to 30 alphanumeric characters in length.
Security Areas
Displays the security areas accessible to this account.
Modify
Lets you add and delete the current account's security areas or application features.
NOTE: If you are creating or editing a user account, the Modify button also lets you add and delete the group
accounts.
The Security Area Naming dialog box displays the following items:
Security Areas
Lists the names of each security area. You can name up to 254 areas.
Modify
Allows you to create or rename the selected security area.
l Require At Least One (OR) - Users require access to at least one specified security area.
l Require All (AND) - Users require access to all specified security areas.
NOTE: It may take up to one minute for this setting to take effect after being saved in the Security Con-
figuration or published from Configuration Hub. During this time, unauthorized users may be able to write to a
tag to which they should not be able, or vice versa. For this setting to take effect as quickly as possible,
SCADA(s) using that Security Path (as in the case of shared security files) must be re-started to ensure they
have the latest value for that setting.
The Security Area Selection dialog box displays the following items:
Authorized
Displays the account privileges accessible to this account.
Available
Displays the account privileges you can assign to the current account.
Add All
Adds all available account privileges to the Authorized list box.
Add
Adds the selected account privilege to the Authorized list box.
Delete
Removes the selected account privilege from the Authorized list box.
Delete All
Removes all available account privileges from the Authorized list box.
Current Users
Displays the existing user accounts and lets you select the account you want to modify or delete.
Add
Lets you add a new user account.
Delete
Lets you remove the selected user account.
Item Description
User Name Displays the full name of the operator whose account you are defining.
You can change the text by typing a new name, up to 30 alphanumeric
characters in length.
Item Description
NOTE: The password is not displayed in this field for security reasons.
When you create or modify a password, the field displays an asterisk (*)
for every character you specify. iFIX user passwords are case insens-
itive when not using Windows security
Login Name Contains the login name of the operator. You can change the text by
entering a new name, up to six alphanumeric characters in length. The
operator enters this name when logging in. If you enable Windows
security for this account, the login name must match the login name of
the operator's Windows user account.
Group
Displays the group accounts accessible to the current user account.
Security
Displays the security areas accessible to this account.
Application
Displays the iFIX application features accessible to this account.
Modify
Allows you to modify the group accounts, security areas, or application features listed for this user.
How Do I...
For more information on the Security Configuration application, click any of the links below:
Click any of the following links for more information on managing user accounts:
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. On the Security toolbox, click the User Account button.
3. Click Add.
4. In the Full Name field, enter a name for the new user account.
5. Depending on the type of security you want to use, do one of the following:
l If you want to use Windows security, select the Use Windows Security check box, and, in
the Full Name and Domain fields, enter the login name and domain name of the Windows
user account you want to use. Be aware that when configuring your Windows users in
iFIX Security, the Domain Name entry needs to be your domain's NetBIOS name.
l If you want to use iFIX security, enter the login name and password for the account in the
Login Name and Password fields.
2. If you want to limit the time the operator remains logged into iFIX, in the Login Timeout field, enter
a timeout value.
3. Add group accounts.
4. Add security areas.
5. Add application features.
6. Save the account.
Click any of the following links for more information on selecting account privileges:
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. From the Edit menu, select User Accounts.
3. Double-click the user account in which you want to add or delete security areas.
4. On the User Profile dialog box, click Modify from the Security Area list box.
5. To add security areas, double-click the ones you want to add from the Available list box. To add
all the security areas to the current account, click Add All.
6. To remove security areas, double-click the ones you want to delete from the Authorized list box.
To remove all the security areas from the current account, click Delete All.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. From the Edit menu, select User Accounts.
3. Double-click the user account in which you want to add or delete application features.
4. On the User Profile dialog box, click Modify from the Application Features list box.
5. To add application features, double-click the ones you want to add from the Available list box. To
add all the application features to the current account, click Add All.
NOTE: Clicking Add All does not add the Electronic Signature – Bypass application feature. You must
add this application feature explicitly.
6. To remove application features, double-click the ones you want to delete from the Authorized list
box. To remove all the application features from the current account, click Delete All.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. On the Security toolbox, click the User Accounts button.
3. Click Add.
4. Enter RECIPE in the Full Name and Login Name fields. Do not assign a password to this
account.
5. Click Modify from the Security Area list box.
6. Double-click each security area you want to add from the Available list box. To add all the secur-
ity areas to the current account, click Add All.
7. Click OK to save the user account in memory.
8. Click OK to close the User Accounts dialog box.
9. On the File menu, click Save.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. On the Security toolbox, click the User Accounts button.
3. Click Add.
4. Enter PUBLIC in the Full Name field.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. On the Security toolbox, click the User Accounts button.
3. Select the user account you want to remove and click Delete. The following text appears:
OK to delete this user?
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. On the File menu, click Clear. The following text appears:
Delete existing security configuration?
3. Click Yes to delete all of your accounts. The following text appears:
Should default user and group accounts be created?
4. Click Yes to create sample group and user accounts or click No to omit this step.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. On the Security toolbox, click the User Accounts button.
3. Double-click the user account you want to modify.
4. Modify the following user account information as needed:
l The account and login names.
l The password (iFIX security only) or the domain name (Windows security only).
l The login timeout value.
l Any group accounts.
l The security areas.
l The application features.
5. Save the user account.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. Create or modify a user account.
3. On the User Profile dialog box, click OK. If you disabled Windows security for the account, and
entered or changed a password, the following text appears in the Password Confirmation dialog
box:
Retype password to confirm changes
4. Enter the password for this account in the field provided, and click OK. If the two passwords
match, security saves the user account in memory. If the passwords do not match, the following
message appears:
Password confirmation failed. Save aborted.
Click any of the following links for more information on managing group accounts:
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. Click the Group Account button on the Security toolbox.
3. Click Add.
4. In the Group Name field, enter a name for the group account that you want to create.
5. Add security areas.
6. Add application features.
7. Click OK to save the group account in memory.
8. Click OK again to close the Group Accounts dialog box.
9. On the File menu, click Save.
Click any of the following links for more information on adding and deleting account privileges:
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. On the Security toolbox, click the Group Account button.
3. Double-click the group account in which you want to add or delete security areas.
4. On the Group Profile dialog box, click Modify from the Security Area list box.
5. To add security areas, double-click the ones you want to add from the Available list box. To add
all the security areas to the current account, click Add All.
6. To remove security areas, double-click the ones you want to delete from the Authorized list box.
To remove all the security areas from the current account, click Delete All.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. On the Security toolbox, click the Group Account button.
3. Double-click the group account in which you want to add or delete application features.
4. On the Group Profile dialog box, click Modify from the Application Features list box.
5. To add application features, double-click the ones you want to add from the Available list box. To
add all the application features to the current account, click Add All.
NOTE: Clicking Add All does not add the Electronic Signature – Bypass application feature. You must
add this application feature explicitly.
6. To remove application features, double-click the ones you want to delete from the Authorized list
box. To remove all the application features from the current account, click Delete All.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. On the File menu, click Clear. The following text appears:
Delete existing security configuration?
3. Click Yes to delete all of your accounts. The following text appears:
Should default user and group accounts be created?
4. Click Yes to create sample group and user accounts or click No to omit this step.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. On the Security toolbox, click the Group Accounts button.
3. Double-click the group account you want to modify.
4. Modify the following group account information as needed:
l The account name.
l The security areas.
Configuring Security
Click any of the following links for more information on configuring security:
1. Enable security.
2. Specify a security and backup path. If you are using a file server, enter the path to the file server
as the security path and enter a local path as the backup path.
3. Specify if you want to use global security paths. If you are using terminal services, it is recom-
mended that you enable this option.
NOTE: With the global security paths option enabled, all iFIX user sessions on this computer share the
same security configuration. This is required in order for security to work properly for multiple users in
a Terminal Services environment, especially when the default SCU is enabled in the Startup Profile
Manager. If you do not enable global security paths, you will need to individually configure security
within each Terminal Services user session.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. On the Security toolbox, click the Configuration button.
3. Select Enabled to enable security or Disabled to disable security.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. On the Security toolbox, click the Configuration button.
3. Select the Use These Paths for All Startup Profiles check box to enable this option, or clear the
check box to disable it.
4. If you cleared the check box to disable this feature, a dialog box appears. Click OK to continue.
IMPORTANT: For global security paths to work correctly, the Base and Language paths in the SCU's
Path Configuration dialog box must be the same for all users. Project paths can differ, however. To
open the SCU, click the Start button and point to iFIX and then System Configuration. Click the Path
Configuration button to open the Path Configuration dialog box. The default Base path is C:\Program
Files (x86)\Proficy\iFIX, while the default Language path is C:\Program Files (x86)\Proficy\iFIX\NLS.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. On the File menu, click Export.
3. In the File Name field, enter the name of the security configuration file you want to create.
4. Click Save. If the name you entered already exists, the following text appears:
filename already exists. Do you want to replace it?
5. Click Yes to overwrite the existing file or click No to re-enter a name for the configuration file and
repeat step 3.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. On the File menu, click Import.
IMPORTANT: Be aware that you cannot import a security file exported from another language.
3. Double-click the file you want to import. The following text appears:
Warning: Imported user accounts may not have passwords! Continue?
5. Click Replace to copy the security configuration defined by the import file to the local node, or
click Add to merge the two configurations together. Any account with a user name or a login
name that matches an existing account is ignored.
Click any of the following links for more information on electronic signatures:
The Electronic Signature dialog box appears when you change the value of a database tag or acknow-
ledge an alarm for which electronic signature is required. This dialog box can display only in the iFIX
WorkSpace in the run-time environment; it does not display in configure mode.
The Description Area at the top of the Electronic Signature dialog box contains the details about the
action. The Performed By section fields are active.
To enter an Electronic Signature:
1. In the Electronic Signature dialog box, in the user name field, enter your user name. If your user
account is connected to a Windows user account, enter your Windows user name. Otherwise,
enter your iFIX login name.
TIP: If you are in continuous use mode, the user name field is filled in with the continuous user name.
You can edit this name.
2. In the password field, enter your password.
3. Optionally, complete the following fields:
a. In the Predefined Comments list box, select a predefined comment.
b. In the Comment field, enter a free-form comment.
4. Click OK. If verification is required, the Verified By section activates and the Performed By sec-
tion dims.
5. In the Verified By area, complete the fields, if active.
NOTE: A user other than the one who completed the Performed By section must complete the Verified
By section.
6. Click OK. The electronic signature is validated, the Electronic Signature dialog box closes, the
new value is written to the tag, and a message detailing your action is written to the Electronic
Signature Audit Trail.
NOTE: If your iFIX user account is connected to a Windows user account and you unsuccessfully
attempt to enter your user name or password, your account may be disabled after a certain number of
tries. This number is determined by your Windows security settings.
Once you complete the Performed By section of the Electronic Signature dialog box, the Verified By sec-
tion activates. If you have completed the Perform By section, someone else must complete the Verify
By section.
To verify an action that requires an Electronic Signature:
1. In the Electronic Signature dialog box,, in the user name field, enter your user name. If your user
account is connected to a Windows user account, enter your Windows user name. Otherwise,
enter your iFIX login name.
2. In the password field, enter your password.
3. Optionally, complete the following fields:
Follow these instructions to configure a tag for electronic signature. To ensure a secure signing envir-
onment, you should not edit a current process database with an older-version node.
To configure a tag to require Electronic Signatures:
1. In the iFIX Database Manager, navigate to the Advanced tab of the tag's dialog box.
2. Select the type of electronic signature that you want for this tag:
l None – Do not require Electronic Signatures for this tag at run time. This is the default
option.
l Perform Only – Require a Performed By signature for any changes or alarm acknow-
ledgements to this tag at run time.
l Perform and Verify – Require both a Performed By and a Verified By signature for any
changes or alarm acknowledgements to this tag at run time.
3. Select the options that you want for this tag:
l Allow Continuous Use – Select to allow the operator to repeatedly sign for successive
actions by supplying only a password. Continuous use applies only to the person per-
forming an action and does not affect the person verifying an action. This is selected by
default.
l Exempt Alarm Acknowledgement – Select to allow operators to acknowledge alarms
without entering a signature, even when this tag requires electronic signature for data
entry.
4. Select how you want the tag to handle unsigned writes. Your options are as follows:
l Accept – Accept the unsigned write.
l Log – When an unsigned write is accepted, send a message indicating that the tag accep-
ted an unsigned write. This option is only available when the tag is configured to accept
unsigned writes.
l Reject – Reject the unsigned write and do not update the database. A message is sent
indicating that the tag rejected an unsigned write. (default)
NOTE: You must purchase the Electronic Signature option for these parameters to take effect at run
time.
Click any of the following links for more information on configuring for automatic login:
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. On the Security toolbox, click the Autologin button.
3. Click Add or double-click the name of the node you want to modify.
4. In the Node field, enter the name of the node you want to configure.
5. In the Application User field, enter the name of the operator you want to log in automatically.
TIP: Click the browse (...) button to select a user from the Select User dialog box.
6. If a Windows user is defined as an automatic login user, enter a password when prompted.
7. Click OK to save your changes in memory.
8. Click OK again to save the configuration to a file.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. On the Security toolbox, click the Autologin button.
3. Select the name of the node you want to remove, and click Delete. The Security Configuration
program deletes the automatic login file for the selected node.
1. In Classic view, the iFIX WorkSpace, click the Security Configuration button on the toolbar.
-Or-
In Ribbon view, on the Applications tab, in the System & Security group, click Security, and then
click Security Configuration Utility.
2. On the Security toolbox, click the Security Area button.
3. Double-click the security area you want to create or rename.
4. In the Name field, enter a name and click OK.
5. Click OK again to accept your changes.
1. Log in to Windows as a member of the Administrators or Account Operators group on either the
local computer or the Windows domain.
2. Double-click CreateWindowsGroups.exe in the iFIX folder. By default, this folder is: C:\Program
Files (x86)\Proficy\iFIX.
The Create Windows Groups dialog box opens, displaying a list of Windows group names. The
CreateWindowsGroups.exe derives the Windows group names from the current iFIX security
configuration.
NOTE: Windows group names display in the list box only if you establish all group and security area
names in the iFIX Security Configuration before using the CreateWindowsGroups tool.
3. Select the appropriate filters and prefix style for the Windows groups that you want to create.
4. Select the groups you want to create from the list. The list may include multiple group names that
represent some of the same iFIX security privileges due to the alias names.
5. Press the CTRL key and click to select multiple group names in the list box. Press the SHIFT key
and click to select a range of group names in the list box.
6. If you are creating Windows groups on the local computer as local groups, click the Create Local
Groups button to create the groups currently selected in the list box.
7. If you are creating Windows groups on the Windows domain as global groups, click the Create
Domain Groups... button. The Specify Domain for Group Creation dialog box appears. Specify a
domain name in which to create the groups currently selected in the list.
Once you create Windows groups, you can use the Windows User Manager or a similar Win-
dows security configuration tool to grant individual membership in the groups to Windows user
accounts.
security areas 26
A
Windows groups 51
account disabled message, configuring 40
audit trail 38
account lockout 40
Security Synchronizer messages 53
setting 40
see log file 38
adding 27
Autologin option 45
application features 27
See Also System Autologin option 45
group accounts 27
automatic login configuration 29
security areas 27
creating 28
adding application features to a group
deleting 30
account 100
described 28
adding application features to a user account 95
automatic login file 107
adding group accounts to user accounts 95
aliases 49 C
iFIX application name feature 58
character limitations 48
using for iFIX application features 48
on global group names for Windows NT 48
application error codes in Security
on iFIX security groups for NT 48
Synchronizer 81
on user-defined iFIX security area names 48
application features 100
COM Automation 58
adding 27
using to program the synchronization pro-
described 3
cess 58
listed 11
command line 54
special assignments 13
using with Security Synchronizer 54
application users 29
command line in Security Synchronizer 54
described 28
errors 83 D
database write access for unauthorized command line parameter in Security Syn-
nodes 18 chronizer 54
security configuration 30
E
exporting the security configuration 103
electronic signatures 38
audit trail 38 F
described 3 deleting 28
iFIX
logging in 37 messages 78
logging out 38 account disabled 40
shutting down 14 security configuration (list) 78
using database program block 57 modifying 28
iFIX security 52 group accounts 28
concurrency with Security Synchronizer 53 iFIX security accounts to match Windows
security accounts 46
configuring for Security Synchronizer 52
modifying a group account 101
implementing 23
modifying a user account 98
security strategy 24
modifying an automatic login file 107
importing
security configuration 30
N
user account passwords 30
naming conventions 26
importing the security configuration 104
security areas 26
L nodes
login 37 P
unsuccessful 38 passwords 27
manual 38 pictures 15
security areas 15
importing 30 definition 43
VBA 18
securing scripts 15
Windows
abbreviations 48
prefix string 49
Windows groups 48
assigning 51
creating 50
Windows NT 49
Windows security
creating users 47