Runtime Client Tools > Schedules > Prepare Your System for Scheduling > Manage Security and Permissions

Manage Security and Permissions

Scheduler integrates into the Citect SCADA security model by allowing access to certain features based on areas and user permissions.

When adding equipment to Scheduler, you can define the area to which the equipment belongs. This helps to add security around the use of equipment, as the Scheduler interface will only list equipment that is available to the current user. They will only be able to create, modify, delete and browse schedules for equipment that belongs to the area or areas that they can access. If the user attempts to access equipment in other through Cicode, an error code is returned.

When a new user logs on, the Scheduler interface will refresh and list the equipment which is available to that user, based on the areas the user has permission to access.

For more information regarding security refer to Security.

Published June 2018