InteliLite4 AMF20 Global Guide
164
Name
Max. 32 characters
Note:
Does not consider duplicities (It is possible to have setpoints with the same
name, but it is not recommended.)
Dimension
Can be chosen from a list or
User can create their own with a limit of 32 characters.
Resolution
Max. 4 decimal place
Low Limit
Range of the data type INT32 (restricted by resolution).
Value is set as a constant (can not be set as setpoint).
Max. value cannot exceed High Limit.
High Limit
Range of the data type INT32 (restricted by resolution).
Value is set as a constant (can not be set as setpoint).
Min. value cannot be lower than Low Limit.
Default value
Must be in range between Low and High Limit (restricted by resolution).
Group
Group in which setpoint will be shown.
Position of a setpoint in a list.
Subgroup
Subgroup in which setpoint will be shown.
Contents of the user setpoint
5.6 User management and data access control
Accessing, monitoring or controlling the device via any communication interface requires a user to be
logged-in.
When a task (read data, write data , control) is to be performed the access level of the user who is
currently logged-in must be higher or equal to the access level required for the particular task.
User must have their user account defined by the administrator of the controller before the user can log-in
into the controller and perform monitoring, control or configuration tasks.
Note:
For trusted interfaces there is an "implicit user"(
see Implicit account on page 165
) automatically
logged in always while no other explicit user is logged in.
5.6.1 Types of interfaces
The controller communication interfaces are split into two categories according to what kind of environment
the interface is exposed to.
Trusted
Trusted interfaces are operated locally inside a closed environment/ infrastructure where additional
measures against misuse or attack take place (e.g. physical access limitation). Due to the nature of
this interface less strict cybersecurity rules may be applied.
Trusted interfaces provide
function which allows the performance of
certain operations without requiring an explicit user to log in.
Trusted interfaces are USB, RS232, RS485.