Table 3:
Default user roles
Role
Description
VIEWER
Viewing what objects are present in the logical device
OPERATOR
Viewing what objects are present in the logical device
Performing control operations such as opening or closing the circuit
breaker
ENGINEER
Viewing what objects are present in the logical device
Making parameter setting and configuration changes in addition to
having full access to the data sets and files
ADMINISTRATOR
Superset of all the roles
describes the default mapping of all the user rights associated with all the
roles in the protection relay. This mapping can be modified according to the user
requirements.
Table 4:
Default roles-to-rights mapping
Rights/Roles
ADMINISTRATOR ENGINEER
OPERATOR
VIEWER
Settings &
Configuration
Read/Write
Read/Write
Read
Read
Settings Group
Handling
Read/Write
Read
Read/Write
Read
Control
Operations
Read/Write
Read
Read/Write
Read
Record Handling
Read/Write
Read/Write
Read
Read
Test Mode
Read/Write
Read/Write
Read
Read
System Update
Read/Write
Read
Read
Read
User
Management
Read/Write
Read
Read
Read
User account information can be exported from IED Users in PCM600 to an
encrypted file which can be imported into another protection relay.
User authorization is disabled by default for the LHMI and can be
enabled with the
Local override
parameter via the menu path
Configuration/Authorization/Passwords
. Changes in user
management settings do not cause the protection relay to reboot.
The changes are taken into use immediately after committing the
changed settings on the menu root level. When the
Local override
parameter is set to "False", Local User Account Management
comes into use.
If the
Remote override
parameter under
Configuration/Authorization/Passwords
menu has been disabled, all MMS communication (such as communication with
SCADA) requires authentication using the correct password.
Remote override
is
enabled by default. Remote override does not impact FTP/FTPS/USB clients such
as PCM600. Username and password are always required for communication with
Section 4
2NGA000818 A
User management
16
REX610
Cyber Security Deployment Guideline
Содержание Relion REX610
Страница 1: ...RELION PROTECTION AND CONTROL REX610 Cyber Security Deployment Guideline...
Страница 2: ......
Страница 8: ...Section 8 Glossary 27 Table of contents 2 REX610 Cyber Security Deployment Guideline...
Страница 12: ...6...
Страница 14: ...8...
Страница 20: ...14...
Страница 30: ...24...
Страница 34: ...28...
Страница 35: ...29...