Security | About Security | User Security | Security

Security

You can protect a Citect SCADA runtime system with user-based security. This can be integrated with existing Windows™ user groups, or you can create your own user accounts in Citect SCADA.

In both cases, users are assigned to "roles" that determine the permissions they are granted. Roles use "privileges" to restrict access to specific commands (such as those that operate specialized machinery or acknowledge critical alarms), and "areas" to control access to geographical or logical sections within a plant.

For more information, see Configure Security.

This section of the help also describes how to limit access to a computer while Citect SCADA is running (see Securing Runtime Computers).

Published June 2018