About Citect SCADA > Working with Citect SCADA > Secure Your System

Secure Your System

A Citect SCADA system is protected by implementing a user-based security model. When planning a project, you need to consider who will be using the system and the areas they will need to access.

There are two ways you can manage user accounts:

In both cases, access to the Citect SCADA system is managed by assigning user accounts to "roles" defined within a project. Roles specify for a particular type of user:

Roles and Citect SCADA user accounts are configured using the Security activity.

You can also secure your runtime computers, or run Citect SCADA as a Windows service.

See Also

Published June 2018