A Citect SCADA system is protected by implementing a user-based security model. When planning a project, you need to consider who will be using the system and the areas they will need to access.
There are two ways you can manage user accounts:
In both cases, access to the Citect SCADA system is managed by assigning user accounts to "roles" defined within a project. Roles specify for a particular type of user:
Roles and Citect SCADA user accounts are configured using the Security activity.
You can also secure your runtime computers, or run Citect SCADA as a Windows service.
See Also
Published June 2018