Section 14
Authorization
About this chapter
This chapter describes password procedures and levels of access in the system.
14.1
Overview
To safeguard the interests of our customers, both the IED and the tools that are
accessing the IED are protected, by means of authorization handling. The
authorization handling of the IED and the PCM600 is implemented at both access
points to the IED:
•
local, through the local HMI
•
remote, through the communication ports
14.2
Principle of operation
There are different levels (or types) of users that can access or operate different
areas of the IED and tools functionality. The pre-defined user types are given in
.
Be sure that the user logged on to the IED has the access required
when writing particular data to the IED from PCM600.
The meaning of the legends used in the table:
•
R= Read
•
W= Write
•
- = No access rights
1MRK504114-UEN E
Section 14
Authorization
107
Operator's manual