Metsy Security Admin PDF
Metsy Security Admin PDF
Bulletin
Related Documentation...................................................................................................................7
Authentication Overview...................................................................................................................... 8
Authorization Overview........................................................................................................................ 9
Warning Banners................................................................................................................................... 9
Privileges Overview............................................................................................................................. 10
Summarized Tab.................................................................................................................................. 17
Intracomputer Password....................................................................................................................17
Authentication Process....................................................................................................................... 19
Authorization Process......................................................................................................................... 21
Username Semantics.......................................................................................................................... 27
Restrictions...........................................................................................................................................29
Steps to Enable Active Directory Service for Use by the Metasys System............................... 31
RADIUS Overview........................................................................................................................... 34
Situations When Metasys System Login Screen Appears for RADIUS Users................................ 35
Access Type..................................................................................................................................... 39
Administrators................................................................................................................................ 40
User Properties...............................................................................................................................44
Password Rules....................................................................................................................................55
Password Complexity..........................................................................................................................56
Roles Tab......................................................................................................................................... 58
Navigation Tab................................................................................................................................66
Role Properties............................................................................................................................... 67
Users Tab.............................................................................................................................................. 68
Navigation Tab..................................................................................................................................... 70
Active Directory Service and RADIUS - Security Database Backup and Restore......................... 71
Security Copy.................................................................................................................................. 72
Detailed Procedures.......................................................................................................................72
Assigning Access by Using the User Properties or Role Properties Dialog Boxes............74
Enabling Active Directory Service Integration for ADS/ADX, ODS, or SCT Software.........78
Removing User Access to Active Directory Service from the Metasys System...................84
RADIUS Errors............................................................................................................................90
Integrated Authentication..................................................................................................................92
Metasys Services...................................................................................................................................93
Server Name.............................................................................................................................. 99
Passwords................................................................................................................................ 100
In this document, general use of the term user refers to any of the three types of users, unless
differentiated.
Summary of Changes
The following is new or revised for the Security Administrator System Technical Bulletin at Release
10.0:
• Documented the removal of the intracomputer password from network engines, System
Configuration Tool (SCT), Metasys UI, NAE Update Tool, and the Language Installation Program
(LIP).
• Documented the new Warning Banners list in the Site Management Portal (SMP).
• Documented changes made to the Metasys Local User Lockout Policy in the Account Policy Tab.
• Removed SCT SQL Server information from the SQL Server Login Accounts and Database
Connection Configuration Tool (DBCCT) as it is now integrated with Windows® authentication.
• Documented the improved layer of security provided by the Advanced Security Enabled
attribute in SCT at this release.
Related Documentation
Table 1: Security Administrator System Related Documentation
or
or
Authentication Overview
Security is based on user accounts and roles. Roles are groups of users with a specific function
within the Metasys system. To access the system, an administrator provides a username and the
password. When creating users within the Metasys system, use ASCII characters only. Do not use
the characters @ or \ to create Metasys local user names. The @ and \ characters are reserved for
Active Directory service user names that are added to the system.
Note: If the Microsoft Active Directory service feature and Microsoft Windows® Workstation
SSO are both enabled for use by the Metasys system, you generally do not need to specify your
username and password. The Active Directory service credentials that you specified when
you logged in to the OS are automatically passed to the Security Administrator system for
authentication. For details, see Overview of Active Directory Service Implementation on the
Metasys System.
Click Login on the Login screen to send your user credentials. If Active Directory service is enabled,
you also need to select your user domain or enter a local username and select Metasys Local from
the domain selection drop-down menu. If RADIUS is enabled, you also need to select your user
domain, enter a local username and select RADIUS from the domain selection drop-down menu.
For local users, the extended architecture Security Administrator system authenticates the user’s
information against the Security database. For Active Directory service enabled users, the selected
Active Directory service domain authenticates the user (no Security database authentication
occurs). For RADIUS enabled users, the selected RADIUS server authenticates the user (no Security
database authentication occurs).
A unique session opens when your user credentials match the login requirements. The session
allows access to the system for a configurable period. When the credentials do not match, a dialog
box appears indicating that the credentials are incorrect or user access is denied. (For more details
When you click Login, the IPv4 address of the computer you are using is recorded in the Metasys
Audit file. You can view the login transaction by opening the Audit Viewer. If the user logs in to the
Metasys Advanced Reporting System and the SMP UI the SMP UI login time is recognized as the last
login time. If the user logs in for the first time, the status box indicates Never as the last login time.
Authorization Overview
Authorization provides users with the appropriate permissions and privileges for the Building
Automation System (BAS). Use the Security Administrator to create Metasys local user accounts,
add Active Directory service users, add RADIUS users, and grant privileges to system functionality
through roles or direct user assignment.
Warning Banners
If a Warning Banner is enabled on the Site object, a special warning statement appears every time
you launch the SMP UI. To configure this setting, navigate to the Site object of the Site Director and
click the Site View tab. In the Warning Banner section, select one of the following:
• U.S. Department of Defence (DOD) Warning Banner
• U.S. Department of Transportation (DOT) Federal Aviation Administration (FAA) Warning Banner
The selection may take up to five minutes to become effective.
Once enabled, Warning Banners appear for all local, Active Directory service, and RADIUS users
when they log in to the SMP UI. Active Directory and RADIUS users must agree to the conditions on
the warning statement before access is granted. Warning Banners do not appear when you log in
to SCT.
Privileges Overview
Privileges allow users to perform certain tasks within the Metasys system. Administrators set up
privileges to determine which actions each user is authorized to perform. A privilege is a group of
related user actions (for example, the Intervene privilege includes actions such as disable, enable,
release, and reset).
Privileges are divided into two types: category-based and system-based. Category-based privileges
apply only to the categories of the Metasys system items or objects for which the user is explicitly
authorized (such as General, Security, and Lighting). System privileges apply to the Metasys system
as a whole and include actions such as discard events and manage audit history.
Any privileges that can be assigned to a role can also be assigned to either a Metasys local user,
an Active Directory service user, or RADIUS user. A role is like a template of privileges that, once
created, is applied to multiple users. When you assign users to a role, they are granted the
privileges associated with that role, in addition to their specific user privileges, if any. Assign roles
to centralize administration of users.
Note:
• The System Configuration Tool, available as a system privilege in the ADS/ADX/ODS and SCT,
only applies for the SCT. Therefore, if you need to provide SCT access to a user, assign the
user to the System Configuration Tool system privilege through the Security Administration
window in SCT.
• Changes to privileges do not take effect until the next time the user logs in to the system.
For example, if users are currently logged in, the changes you make to their accounts do not
affect their privileges until the users log out and log in again.
Figure 3 shows the authorization categories as they appear in the Security Administrator System
and how the authorization category-based privileges are assigned to each authorization category.
The Active Directory Users folder shown in the left pane appears only if Active Directory service
is enabled for the site. See Table 2 for detailed descriptions of the authorization category-based
privileges.
Note: The Security Administration system in Metasys Release 5.2 or later provides up to 150
custom categories. However, if you set up your user profile prior to Metasys system Release
5.2, then you are limited to the 12 custom categories.
Commands included: Use GIO to Change Name, Change Units, and Change
Display Precision
When users modify items, they can only set the Authorization Category
property of a modified object to a category for which they have modify
access permissions.
Configure Items Gives the user the following privileges: Add, Modify, or Delete an Item.
When users create objects, they can only set the Authorization Category
property to a category for which they have configuration access permission.
Note: To disable the All Items Organizer for a user, you must
remove the Manage Devices & Sites privilege from the available
privileges for the user.
1
display the Audit Viewer, the user must have View permission and View
Metasys Status permission. Also, the audit data visible in the Audit Viewer
depends on the categories for which the user has View privileges.
Manage Audit History
1
Gives the user permission to annotate audit entries.
Discard Acknowledged Gives the user permission to discard acknowledged events. Applies to
Events all events a user can manage through the Manage Item Events action
set. See the Discard All Events permission description for information on
discarding unacknowledged events.
Advanced Reporting
1
Gives users with Standard Access permission to access the Metasys
Advanced Reporting System. In the Advanced Reporting system, users
can run reports to view on a web browser. The Advanced Reporting
privilege appears in the list of permission privileges only if Metasys
Advanced Reporting System is installed. For more information, refer
to the Metasys® Advanced Reporting System and Energy Essentials Help
(LIT-12011312).
Schedule Reports
1
Gives the user permission to create new Scheduled Reports (Query
menu), and to run, modify, reschedule, or delete scheduled reports using
the Scheduled Reports Viewer. All users, including those without this
privilege, may use the Scheduled Reports Viewer to monitor the status of
scheduled reports.
Snooze All Events Applies to all events a user can manage by using the Manage Item
Events action set. This action set should be used carefully because it is a
system-wide snooze.
System Configuration Gives users with Standard Access at releases earlier than 7.0 the
Tool following privileges: Access to SCT, Configure and Simulate using the SCT,
Passthru mode, and Import Integration. Gives Users with Basic Access
permission to use Passthru mode. Basic Access and Tenant Access users
do not have access to the SCT.
Note:
• For a unified ADS/ADX or ODS with SCT, the System Configuration
Tool system privilege does not provide the user access to SCT
when assigned using the ADS/ADX or ODS Security Administration
window. Instead, assign the user to the System Configuration
Tool system privilege using Security Administration window in
SCT.
• Starting at Metasys Release 7.0, a computer that has both SCT and
Metasys Server installed have separate security databases, which
means the user access credentials for SCT are different from (and
not shared by) the user access credentials for Metasys SMP.
1 This privilege does not apply to users with Tenant Access, and does not appear in the System Privileges for Role/User
dialog box for Tenant Access accounts (Figure 5). See Access Type for more information.
You must have this permission for the authorization category of the
point for which you are overriding the value, even if you do not have
explicit permission for the authorization category of the point you are
commanding.
Release Intervene Permission (Authorization Category-Based)
You must have this permission for the authorization category of the
point for which you are releasing the override, even if you do not have
explicit permission for the authorization category of the point you are
commanding.
Take Out of Service Diagnostic Permission (Authorization Category-Based)
Put Back in Service You must have this permission for the authorization category of the point
for which you are taking out of service or putting back in service, even if
you do not have explicit permission for the authorization category of the
point you are commanding.
• SCT
• Metasys UI
• LIP
Note: The intracomputer password continues to be used for communications between pre-
Release 10.0 devices.
At Release 10.0, each device has its own unique Device Key, which is generated during the pairing
process. The Site Director stores its own individual device secure key and maintains the keys of all
child devices. This transition affects the pairing process between network engines and Site Director
from this release onwards. For further information, refer to the Pair NxE with Site Director section in
Metasys SCT Help (LIT-12011964).
Authentication Process
Without Active Directory service integration, authentication is performed through an internal
Metasys login process against a local Security database. With Active Directory service integration,
authentication is performed for Active Directory service users against an Active Directory service
authority called a Domain Controller. If you are logged in to the operating system with an Active
Directory service user account that is privileged on the Metasys system, you proceed directly to the
main Metasys SMP UI screen without stopping at the login screen. The Metasys system provides this
SSO function for any Active Directory service user who is also a Metasys system user, regardless of
how they accessed the Site Director (either locally at the Site Directory computer itself or remotely
from a client machine that is directly addressable on the network).
• when you are logged in to the Windows OS with an Active Directory service user account that is
not privileged within the Metasys system
• when you are logged in to the Windows OS using a local Windows account and not an Active
Directory service user account
• when access to Active Directory service is restricted at login time because of an Active Directory
service time sheet (known as Logon Hours) or access is restricted to the Metasys system via
the Metasys time sheet. Active Directory service Logon Hours takes precedence, so if you are
restricted from operating system access, but not restricted by a Metasys time sheet, access to the
Metasys system as an Active Directory service user is not granted.
• if you log in to a Metasys device such as a Network Automation Engine (NAE) or Network Control
Engine (NCE)
• if Metasys authorization fails for any reason, such as when a user without System Configuration
Tool permissions attempts to log in to SCT
• if SSO access is disabled for the site (that is, Windows Workstation SSO is set to disabled)
When the Metasys SMP UI login window appears, and the site has Active Directory service
authentication enabled, a list of available domains appears.
Figure 7: Metasys Login Screen with Active Directory Service Domain List
• Enter an Active Directory service username in the form of domain\username (sometimes called
the pre-Windows 2000 format) and an Active Directory service password. (The Login to drop-
down list becomes disabled.)
• Enter a fully qualified Active Directory service username in the form of user login
name@domain specifier and an Active Directory service password. (The Login to drop-down list
becomes disabled.) The domain specifier name must be the fully qualified domain name at the
domain level for hybrid UPN authentication users or the forest level domain name for exact UPN
authentication users. For more information on hybrid UPN and exact UPN authentication, see the
Username Semantics section.
• Enter a Metasys local username and password and click Metasys Local in the Login to drop-
down list.
- The Metasys system only allows active user accounts to log in from this screen.
Dormant or locked accounts are not accessible.
The user credentials are strongly encrypted before being transmitted over the network for
authentication. (For details on the encryption process used, refer to the Network Message Security
section of the Network and IT Guidance Technical Bulletin (LIT-12011279). These credentials are active
for the entire Metasys SMP UI session until you log out (or the user session terminates).
If the Metasys Device Manager has not fully started, and you try to log in to the ADS/ADX, a runtime
status error occurs and the Metasys login screen appears. In this case, the Metasys login screen does
not display the Active Directory service domain drop-down list and you are not able to log in with an
Active Directory service user account.
To log in as an Active Directory service user, you must close the login screen, wait a few moments
for the Metasys Device Manager to fully start, then navigate again to the ADS/ADX. If you remain at
the login screen following the startup error and do not close it, then log in with a Metasys local user
account, all Active Directory service menu options and functions are unavailable. To restore Active
Directory service options and functions, you must close the browser and navigate to the ADS/ADX
again, then specify your Active Directory service credentials.
• If only one service account is defined, the domain list is based on the list of users added to the
Metasys system. In other words, the domain list changes as users from different domains are
added and removed from the Metasys system.
Authorization Process
After you have passed through the authentication process, the authorization step is next.
Authorization is the process of verifying that a known, authenticated user has the authority to
perform a certain operation. Within this process, you determine your access rights by looking up
your permissions in the Metasys Security database. You may assign Active Directory service user
permissions directly or through Metasys roles. You determine permissions in the same manner as
for a Metasys local user.
If authorization is successful, the Metasys SMP UI appears. If either authentication or authorization
fails, or if SSO is disabled, the Metasys SMP UI login screen reappears and you must continue the
login process by entering either your Active Directory service or Metasys local credentials.
Table 6 lists scenarios that may occur when you log in.
Are You Logged Does Active Directory Action When You Attempt SSO Login
in to OS as Service User Account
Active Directory Exist in the Metasys
Service User? System?
Yes Yes SSO login permitted. Metasys login screen does not
appear.
Yes No SSO login not permitted. Login screen appears with
message:
Are You Logged Does Active Directory Action When You Attempt SSO Login
in to OS as Service User Account
Active Directory Exist in the Metasys
Service User? System?
No Yes SSO login not permitted. Login screen appears with
message:
To log out, click the Logout button on the SMP UI of the Metasys ADS/ADX. This action returns you
to the Metasys login screen (or Warning Banner screen, if enabled), but does not log you out of
Microsoft Windows or the Active Directory service. The login screen (or the Warning Banner screen,
if enabled) also appears if your session becomes inactive and times out.
If you exit the Metasys system by closing the Metasys SMP UI window, you are logged out, but the
Metasys login screen does not appear.
Active Directory service passwords are not maintained or cached within the Metasys Security
database; therefore, they cannot be changed using the Metasys SMP UI. The Security Administrator
system maintains passwords for Metasys local accounts.
An Active Directory service user is also marked as deleted if the synchronization process fails to
return any attributes for the user. The synchronization process cannot determine the cause of this
behavior. Once the error condition is resolved, the user is re-enabled in the Metasys system the next
time the user is synchronized.
The fully qualified username is used to identify the currently logged in user on the main Metasys
SMP UI screen (Figure 9). The name also appears as the username on Metasys reports and
logs (Figure 9). For more details on how to specify an Active Directory service user name, see
Username Semantics.
• Each user you specify must exist and be enabled in Active Directory service. Properties of the
user, such as the phone number and email address, are read when you add the user to the
Metasys system. The Metasys SMP UI displays these items under User Properties. For details, see
Information Obtained from Active Directory Services.
• If the username for an Active Directory service user changes, you do not need to specify the
new name with the Metasys System Administrative tool. Before the user can log in again, update
the username with the Security Administrator tool by clicking the Active Directory service user
account. For details, see User Name Synchronization in the Metasys System.
• If an Active Directory service user is deleted from the Active Directory service database, delete
that user from the Metasys system as well. If you add an Active Directory service user with the
same username to the Active Directory service database, but you did not delete this user from
the Metasys system, you cannot add the new user to the Metasys system until the original user is
• If you disable an Active Directory service user in the Active Directory service database, the
Metasys Access Suspended property check box in the user’s Properties window becomes selected.
Once you re-enable the Active Directory service user, a Metasys Administrator must manually
clear the Metasys Access Suspended property check box before the user can log in again.
• The Metasys system follows the text case format dictated by Active Directory services. In other
words, if you add a user called [email protected], and the Active Directory service format
uses all lowercase characters, the username adjusts to [email protected] when added,
because the user name is not case sensitive.
• At least one defined service account for Active Directory service must have the privilege to read
the user’s Active Directory service attributes. For more details, see Information Obtained from
Active Directory Services and Service Account.
Username Semantics
An Active Directory service fully qualified username consists of three parts: the user login name, an
at sign (@), and the domain specifier:
{User Login Name}@{Domain Specifier}
The user login name must be an existing name that is a member of the Active Directory service,
and the domain specifier can be either at the domain level or at the forest level depending on your
web.config file appSettings section. For more information, see the Steps to Enable Exact UPN
Format section.
At Release 8.1, you can enable authentication for an exact UPN format that complies with Microsoft
Office 365 authentication in which the domain specifier is at the forest level. For example, you can
have company.com instead of division.company.com.
If the hybrid UPN format is the only UPN format available, the domain specifier must be a fully
qualified domain name (FQDN). For example, division.company.com instead of company.com.
If you rename the user’s login name, the Metasys Administrator must synchronize the user with
Active Directory service before the rename is recognized within the Metasys system. The user
cannot use SSO login-free access to the Metasys system until the synchronization occurs. For
synchronization details, see User Name Synchronization in the Metasys System. If you change
the domain specifier for the user (that is, move the user to another domain), you must delete the
original user, then re-add the user to the Metasys system using the new domain name.
You can add an Active Directory service user with any of these methods (Figure 29):
• In the toolbar section of the Security Administration screen, click the Add Active Directory User
icon.
• On Security Administrator screen, click the Insert > Insert Active Directory User menu option.
• In the Roles and Users tab, right-click the Active Directory Users folder.
You can change a Metasys system user account from a Metasys local account to an Active Directory
service user account; however, since the Metasys system does not provide a method to convert the
user directly, you have the following options:
• Keep the Metasys local user account active as a backup account in case the Active Directory
service becomes temporarily unavailable. Remember that the new Active Directory service
user account is not linked in any way to the Metasys local account. Therefore, the local account
remains under control of existing Metasys system tools, including password changes.
• Disable the Metasys local account after you are sure that you have properly set up the user’s
Active Directory service user account in the Metasys system.
• Description (Description)
• Email (mail)
Service Account
The Metasys system requires a service account in Active Directory service consisting of an Active
Directory service username and password. The feature uses this service account when querying
Active Directory service. The system allows for the use of one service account to access all domains,
or one service account per domain. For details, see Service Account Rules.
The customer’s IT department defines the service account username and password. You should
create this user with a non-expiring password. If the IT department requires the modification of
the service account password on a periodic basis, you must define a Metasys system work process
to update the password in the Security Administrator System at the time it is changed in Active
Directory service. If the service account password in the Metasys system does not match the service
account password in Active Directory service, Active Directory service users cannot access the
Metasys system.
• The tool does not allow a blank password for a service account.
• Whenever you change the domain or username of the service account with the Metasys Security
Administrator tool, you must also enter the password.
• You should configure the service account with a non-expiring password; however, if the
password is set to expire, you need to reset it in the Metasys Security Administration system tool
each time you reset it on the Active Directory service domain.
• Read-only access to the each organizational unit that includes Active Directory service users who
are Metasys system users.
• Read-only access to the attributes of each Active Directory service User Object that are Metasys
system users or read access to only the following individual attributes on those user objects (if
full read access is not allowed):
- objectSID
- sAMAccountName
- displayName
- description
- userPrincipalName
- telephoneNumber
- userAccountControl
• Non-expiring service account password (see Service Account Rules).
• The service account must be able to access all domains with Metasys system users to do LDAP
queries. For example, accounts cannot be denied access to the domain controller by the
domain's security policy.
Restrictions
The Active Directory service on the Metasys system has the following restrictions:
• The Active Directory service for use by the Metasys system with SSO login-free access and login
access is available for the ADS/ADX and SCT; it is not available when you log in to an NAE, NCE, or
NIE directly.
• The Change Password menu option is disabled for an Active Directory service user. An Active
Directory service user may not change their Active Directory service user account password
through the Metasys system SMP UI.
• Existing Metasys local users must not use the reserved characters of @ or \ in their usernames.
This restriction is necessary to avoid collision with fully qualified Active Directory service
usernames.
• The NAE/NIE UIs do not currently support authentication with Active Directory service. However,
if you have an ADS/ADX Site Director, you can log in to the ADS/ADX UI using SSO or Active
Directory username and password and access system information for the entire site, including
details on the NAE/NIE.
• If you are using the Metasys for Validated Environments (MVE), the SSO login-free access is
supported for the SCT but is not supported for the ADS/ADX SMP UI. Active Directory users can
still select a domain and use their Active Directory user names and passwords on the SMP login
screen if the Active Directory feature is enabled and configured.
Table 9: Overview of Actions Required for Enabling Active Directory Service for Use by the
Metasys System
- By default, the Metasys software and databases are installed to the C: drive. If you
have customized the installation location, specify the location. For example, if you
installed on drive E, use E:\.
4. Click Open.
5. Modify the following key under the<configuration><appSettings> section from false to true:
<! --Whether to validate onexact UPN for Office365 style ActiveDirectory --
><addkey="enableOffice365StyleActiveDirectoryAuthentication"value="true"></add>
7. If SCT is not installed on the same computer as the ADS/ADX, ADS-Lite, or ODS, restart the
target server.
If SCT is installed on the same computer as the ADS/ADS, ADS-Lite, or ODS, continue to Step
7a.
a. Open Notepad by right-clicking and selecting Run as Administrator.
- By default, the Metasys software and databases are installed to the C: drive.
If you have customized the installation location, specify the location. For
example, if you installed on drive E, use E:\.
8. After editing the web.config files, you can begin adding Active Directory users with exact UPN
usernames to the Metasys system using the Security Administrator System.
RADIUS Overview
You can optionally configure the secured server and network engines to authenticate non-local user
access through a Remote Authentication Dial-In User Service (RADIUS) server. RADIUS is used by
the server and network engines to authenticate the identity of authorized non-local users of the
system.
All RADIUS users must have a Metasys system user defined for which Metasys authorization is
created and maintained. The server and network engines RADIUS implementation adheres to the
following Internet RFC documents:
• RFC 2865 - Remote Authentication Dial In User Service
• RFC 2759 - Microsoft Point-to-Point Protocol (PPP) Challenge Handshake Authentication Protocol
(CHAP) Extensions, Version 2
The Metasys system implementation of RADIUS is as follows:
• Before you add a RADIUS user account to the security system of a network engine, first add the
network engine as a client of the RADIUS server. If you first configure the RADIUS server settings
in the network engine before you perform this prerequisite step, you may get the message
Unable to login - Unexpected Error when you try to log in. If this error appears, reset the
network engine from the SMP UI. Then try to log in again. The RADIUS server authenticates the
user and login is successful.
• The Metasys system does not import authorization; all Metasys system users, both local (Metasys)
and non-local (RADIUS), are authorized through user configuration done online in the SMP, then
stored in the Metasys Security Database.
• The user ID must match what is expected to be authenticated by the RADIUS server, with or
without the @domain as defined by the local RADIUS implementation.
• Since the Metasys system performs no local authentication of non-local users, all password
functions are unavailable or ignored when creating and maintaining non-local Metasys user
accounts. RADIUS passwords are never stored in the Metasys Security Database.
• When a non-local user receives a number of consecutive RADIUS failures to authenticate and
the account has been set up to lock after receiving that many failed login attempts, the Metasys
system authorization locks, prohibiting the user from accessing the Metasys system device until a
Metasys system administrator unlocks the account.
• When a non-local user is authenticated by RADIUS, and the Metasys system schedule prohibits
access during the login time, the user's login attempt fails.
When a user provides a non-local username to the Metasys system for login, after confirming the
supplied password conforms to Metasys complexity rules, the controller passes the credentials,
including the username and password, to the configured RADIUS server for authentication. After
• when you are logged in to the Windows OS with a RADIUS user account that is not privileged
within the Metasys system
• when you are logged in to the Windows OS using a local Windows account and not a RADIUS
user account
• when access to RADIUS server is restricted at login time through a RADIUS user time sheet
(known as Logon Hours) or access is restricted to the Metasys system through the Metasys time
sheet. RADIUS server Logon Hours takes precedence, so if you are restricted from operating
system access, but not restricted by a Metasys time sheet, access to the Metasys system as a
RADIUS user is not granted.
• if your RADIUS user account is enabled, but overridden to disabled with the Metasys Access
Suspended property within Metasys Security Administration User Properties
• if you log in to a Metasys device such as an ADS, ADX, ODS, SCT, NAE, or NCE
• if Metasys authorization fails for any reason, such as when a user without System Configuration
Tool permissions attempts to log in to SCT
When the Metasys SMP UI login window appears, and the site has RADIUS authentication enabled,
RADIUS appears in the Login to field.
From this screen, you have the following options:
• Enter a RADIUS username and password, and click RADIUS in the drop-down list.
• Enter a RADIUS username in the form of domain\username and a RADIUS password. (The Login
to drop-down list becomes disabled.)
Note: Usernames are obscured at login for RADIUS accounts. After login, usernames are
partially obscured (for example, JSmith appears as JSm***).
The user credentials are strongly encrypted before being transmitted over the network for
authentication. These credentials are active for the entire Metasys SMP UI session until you log out
(or the user session terminates).
If the Metasys Device Manager has not fully started, and you try to log in to the ADS/ADX/ODS, a
runtime status error occurs and the Metasys login screen appears. In this case, the Metasys login
screen does not display the RADIUS server domain drop-down list and you are not able to log in as
a RADIUS user.
Icon Description
Adds a new user to the Roles and Users tree. The User Properties dialog box appears.
Adds a new role to the Roles and Users tree. The Role Properties dialog box appears.
This option is disabled for Basic Access administrators.
Adds a new Active Directory service user to the Roles and Users tree. The Add Active
Directory User dialog box appears.
Marks the standard user account as disabled. Next time you attempt to log in to the
system, an account disabled message appears. Your user account must be re-enabled by
an administrator through the User Properties.
Note: Active Directory service users cannot be disabled in this manner. Account
accessibility is managed by the Active Directory Service administrator.
Opens the System Privileges window.
Opens the Metasys® SMP Help (LIT-1201793), Metasys® SCT Help (LIT-12011964), or the Open
Data Server Help (LIT-12011942).
There is no Help system for the Security Administrator system. Information on the
Security Administrator system is located only in Security Administrator System Technical
Bulletin (LIT-1201528) (this document).
Note: A File Download dialog box may appear. To open the Help system, click Open.
Icon Description
Standard Access user account is enabled.
Standard access Metasys user account is disabled (Account Disabled property check box
selected). Standard access Active Directory service user account or RADIUS user account
has Metasys system access suspended (Metasys Access Suspended property check box is
selected).
Standard access Active Directory service user account is disabled in Active Directory
service (Metasys Access Suspended property check box is cleared).
Icon Description
Basic Access Metasys local user account disabled (Account Disabled property selected).
Basic access Active Directory service user account or RADIUS user account has Metasys
system access suspended (Metasys Access Suspended property check box is selected).
Basic access Active Directory service user account is disabled in Active Directory service
(Metasys Access Suspended property check box is cleared).
Tenant access Metasys local user account disabled (Account Disabled property selected).
Tenant access Active Directory service user account or RADIUS user account has Metasys
system access suspended (Metasys Access Suspended property check box is selected).
Tenant access Active Directory service user account is disabled in Active Directory service
(Metasys Access Suspended property check box is cleared).
Access Type
The Security Administrator system provides three types of access for user accounts: Standard
Access, Basic Access, and Tenant Access.
• Standard Access allows the Metasys local system user or Active Directory service user to access
all authorized features of the online SMP UI and the SCT; also allows users to access the Metasys
UI.
Note: If you have Standard Access and the Advanced Reporting privilege, you can use the
Metasys Advanced Reporting System.
• Basic Access allows the Metasys local system user or Active Directory service user to access all
authorized features provided in the Basic Access mode of the online SMP UI; also allows users to
access the Metasys UI.
• Tenant Access allows the Metasys local system user or Active Directory service user to access all
authorized features of the Metasys UI.
Administrators can assign access types for users on the User Properties tab of the Properties of
User Operator dialog box. See Figure 12 and User Properties Tab – Metasys Local User.
Access types must meet the following requirements:
• Each user account can have only one type of access to the Metasys system.
• Users requiring Standard Access, Basic Access, and Tenant Access must have a separate user
account for each access type with different user names.
• A user who wants both a Metasys local account and an Active Directory service user account must
have separate user accounts for each.
• You can use a user account with Standard Access to log in to the online SMP UI, and the SCT. You
cannot use a Standard Access user account to log in to the Basic Access mode of the SMP UI.
• You can use a user account with Basic Access to log in to the Basic Access mode of the SMP UI.
You cannot use a Basic Access user account to log in to the Standard Access mode of the SMP UI
or the SCT.
• When upgrading the Security Database from a version prior to Release 2.0, each user account
defaults to the Standard Access type. A standard administrator can change an account to Basic
• A user with a Metasys local account must select the Metasys Local option on the login screen for
the SMP UI or the SCT. A user who is an Active Directory service user must select the appropriate
domain name on the login screen.
• Tenant users cannot be Metasys system administrators and cannot have any of the following
system-level privileges:
- System Configuration Tool (SCT)
Administrators
The Security Administrator system provides two predefined administrators for user accounts:
MetasysSysAgent and BasicSysAgent.
Standard administrators can change the access type for any account except MetasysSysAgent and
BasicSysAgent to Standard Access, Basic Access, or Tenant Access.
All Metasys local system users and Active Directory service users who are Standard Access
administrators can administer other Standard Access Metasys local system and Active Directory
service users.
In addition, Basic Access administrators cannot remove Standard Access or Tenant Access users
from any role, cannot modify Role properties, and cannot modify system access or category-based
permissions for any role.
All Metasys local system users and Active Directory service users who are Basic Access
administrators can administer other Basic Access Metasys local system and Active Directory service
users.
• You may not delete or rename the predefined set of users; however, you may add or remove the
predefined users (except the MetasysSysAgent and BasicSysAgent) to or from roles and copy the
users. You can view the Access Permissions and Properties of the predefined users but not edit
them.
• You may not delete or rename the predefined set of roles; however, Standard administrators may
add or remove users (except the MetasysSysAgent and BasicSysAgent) to or from the roles and
copy the roles. You can view the Access Permissions on the predefined roles but not edit them.
• You cannot delete the ADMINISTRATOR role. You cannot delete or remove the MetasysSysAgent
or BasicSysAgent administrator account from the system.
• The OPERATOR, ADMINISTRATOR, USER, and MAINTENANCE roles can be copied and then
modified. When you copy these roles, the permissions for those roles are copied as well.
Figure 10 shows a summarized view of a user’s permissions, indicating the permissions provided
by roles and the permissions directly assigned to the user. The two-headed icon indicates the
permission is from the role level. The green check mark indicates that the permissions are from the
user level. Figure 4 shows the relationship between role and user for the user shown in Figure 10.
If you right-click the Users, Active Directory Users, or Roles folder and click Insert on the menu,
you create a New User, Active Directory service user, or Role. See Creating a New Metasys Local
User Account and Creating a New Role for details.
The left pane lists all available user navigation views. When you assign at least one user or role to a
user navigation view, the circle next to it in the list appears solid. If you do not assign users or roles
to the view, the circle appears empty. The right pane shows a summary of the roles and users and
their access to each user navigation view. Both Metasys local system and Active Directory service
users are shown.
You also can assign access to user navigation views on the Navigation tabs of the User Properties
and Role Properties dialog boxes. See User Properties and Role Properties.
User Properties
The User Properties dialog box defines users within the system. The tabs include User Properties,
User Profile, Roles, Time Sheet, Account Policy, and Navigation. See Creating a New Metasys Local
User Account.
At Release 7.0 and later, the ADS, ADS, ODS, and the SCT have separate Security Databases and no
longer share the same security information, including user names and passwords.
Table 15: User Properties Tab Parameters – Active Directory Service User
Password Rules
The following table lists the password rules enforced by the Metasys system user's language_locale
setting. Three primary user language groups are available: English, non-English (Europe), and non-
English (Asia).
Table 17: Metasys System Password Rules
Password rules are not applicable to Active Directory users and RADIUS users.
Password Complexity
All valid passwords are considered complex for the ADS/ADX platforms on Metasys local system
accounts. This feature does not apply to Active Directory service users whom you have added to the
Metasys system because password complexity is controlled by Active Directory services.
1
Email
1
Displays the email address of the user. — No
Phone Number
1
Displays the telephone number of the user. — No
1 For an Active Directory service user, this field is read-only and the following text is appended to its property name from
Active Directory.
Roles Tab
The Roles tab allows administrators to provide access privileges to a group of users without editing
each individual profile. Administrators assign a user to one or more roles (Figure 17). The Roles tab
is the same for both the Metasys local system user and the Active Directory service user.
Table 22: Account Policy Tab Parameters – Active Directory User or RADIUS User Accounts
Navigation Tab
The Navigation tab allows administrators to specify which user navigation views a user can access
(Figure 22). This tab is the same for both the Metasys local system user and the Active Directory
service user, but is disabled in the SCT.
Role Properties
The Role Properties tab defines the roles of users within the system. Assigning users to a role
gives the users all access privileges that are assigned to the role in addition to their user-assigned
privileges. Roles can be assigned on the Users tab of the Role Properties dialog box or on the Role
Properties tab of the User Properties dialog box. See Creating a New Role.
Users Tab
The Users Tab allows administrators to assign users specific roles (Figure 24). The following
example shows that Active Directory service for use by the Metasys system is enabled with a defined
set of Metasys local system users and Active Directory service users.
Whenever you change the Security System database for small-capacity network engines (NAE35,
NIE39, NAE45, NIE49, NCE25, or NIE29), you must issue the Reset Device command to ensure that
the Security Database is archived to permanent memory. This step is not required for N50-class
large-capacity engines (NAE55s and NIE59s). If you do not perform this step for a network engine
that has a poor or dead battery, and that engine loses power, the latest changes to the Security
System database are lost.
You must rename a Metasys local username that includes the reserved characters @ or \ after a
Security Database restore if:
• the user was added to the Metasys system before Release 4.0; and
• the username is intended for login after the Security Database is restored to a Release 4.0 or
later system.
This user cannot login to the Metasys system until the @ and \ characters are removed from the
username. Also, any change to a user’s property that currently includes either of these reserved
characters forces the administrator to rename the user.
Security Copy
The Security Copy function in the SCT allows you copy the user store to a device that is at the
same release or lower than the source system. For example, if you make changes to your Security
Database on the Site Director, you can copy the Security Database with your changes to other
devices in your site. Security Copy is located on the Tools menu of SCT. For more details, refer to the
Metasys® SCT Help (LIT-12011964)
Note: If the factory-default password of a supervisory engine at Release 6.5 has never been
changed, and you upload its archive database with SCT, then use Security Copy to copy its
Security Database to an engine at Release 5.2, the MetasysSysAgent user account becomes
locked out for the Release 5.2 engine. When you try to log in to the Release 5.2 engine with the
MetasysSysAgent user, the message Invalid name or password entered appears. To correct this
issue, change the default password of the Release 6.5 engine, then perform a Security Copy
from the Release 6.5 engine to the Release 5.2 engine.
Detailed Procedures
Changes made to user accounts in the Security Administrator system no longer affect all Metasys
system components that reside on the same computer. For example, on a computer that has both
an ADS and SCT installed, changes you made in the Security Administrator system do NOT affect
both the ADS and the SCT.
For more information on Security Databases at Release 7.0, refer to the Metasys® SCT Help
(LIT-12011964).
Note: Some of the procedures in the following sections apply only to networks that have the
Microsoft Active Directory service technology implemented at the site. If you are enabling the
Active Directory service for use by the Metasys system, see Configuring Active Directory Service
for Metasys System Use.
2. On the Main screen, click Tools > Administrator. The Security Administration window appears
(Figure 3).
3. On the Insert menu, click New User. The User Properties tab of the User Properties dialog
box appears. See Figure 12.
4. Fill in the information and click OK. The New User appears in the Roles and Users tab.
5. Set the other properties and define System Access Permissions for each Metasys local User. For
details, see the Detailed Procedures sections that follow, then see System Access Privileges.
2. On the Role Properties tab, fill in the information. See Table 24.
3. On the Users tab, assign users to the new role using the Add button. See Figure 24.
4. On the Navigation tab, assign access to user navigation views using the Add button. See
Figure 25.
5. Click OK.
The New Role appears in the Roles and Users tab.
2. On the Edit menu, click Properties. The User Properties dialog box appears (Figure 12).
5. Click OK.
2. On the Edit menu, click Properties. The User Properties dialog box appears. See Figure 12.
4. Select the times when users can access the system by clicking time slots to toggle between
Access Allowed (blue highlight with white text) and Access Denied (no highlight with black
text). See Table 20.
2. On the Edit menu, click Properties. The User Properties dialog box appears. See Figure 12.
4. Select options using Table 21 (Metasys local users) or Table 22 (Active Directory service users).
5. Click OK.
2. On the Edit menu, click Properties. The User Properties tab of the User Properties dialog box
appears. See Figure 12.
3. Click to select the User Can View the Item Navigation Tree (Default Tree) check box.
4. Click OK.
Assigning Access by Using the User Properties or Role Properties Dialog Boxes
1. Select the user or role.
2. On the Edit menu, click Properties. The User Properties tab of the User Properties dialog box
appears (see Figure 12) or the Role Properties tab of the Role Properties dialog box appears
(Figure 23).
3. Select the Navigation tab (Figure 22 for user or Figure 25 for role).
4. In the Available Views list, click one or more user views to assign.
5. Click Add.
Note: To remove user Navigation View Permissions from the user or role, click one or
more user views in the Assigned Views list and then click Remove.
6. Click OK.
b. Click individual rows or cells to assign access to particular roles. Click to select or remove
selections as desired.
4. Assign access to users in the Users Access Permissions table:
a. Click the Allow Access column header to assign access to all users. If you have already
assigned all users permission, clicking the column header removes all selections. If
you have not currently assigned one or more users permission to the view, clicking the
column header selects and assigns access to all users.
b. Click individual rows or cells to assign access to particular users. Click to select or
remove selections as desired.
5. In the File menu, click Save. The circle icon next to the view name in the left pane updates
to reflect the changes (filled = at least one role or user assigned, empty = no roles or users
assigned).
6. Repeat Steps 2 through 5 to assign access to other available user navigation views.
2. On the Insert menu, click Copy of User. The Properties for User Copy Of <user or role>
dialog box appears.
4. Click OK.
2. On the Edit menu, click Delete. The Delete <user or role> dialog box appears confirming the
user or role should be deleted.
3. Click Yes.
Notes:
- If you cannot delete the selected user or role (for example, a predefined user), the
Delete menu choice appears dimmed.
2. On the Edit menu, click Properties. The User/Role Properties tab of the User/Role Properties
dialog box appears.
4. Click OK.
2. On the Edit menu, click Properties. The User Properties tab of the User Properties dialog box
appears (see Figure 12).
4. Click OK.
The user can now log in to the system.
2. Assign permissions to the user or role in the Access Permissions table. Use Table 2 as a
b. Click rows to assign all privileges to the authorization category. Click the row again to
remove the selection.
c. Click a cell to assign a single privilege to a single authorization category. Click the cell
again to remove the selection.
3. On the File menu, click Save.
Note: No changes are saved and no error messages appear if you update permissions
for a user in an ADS/ADX system when the database is offline. For example, an offline
database may be the result of Microsoft SQL Server database not running, or an ADX split
configuration network connectivity problem between the web/application server and the
database server. To verify your changes, select another user and then reselect the user to
which you made changes.
2. On the Edit menu, click Properties. The User Properties dialog box appears.
Note: To remove a role, select one or more roles from the Assigned Roles list and click
Remove.
5. Click Add. The selected roles appear in the Assigned Roles list.
Note: To remove a role, select one or more roles from the Assigned Roles list and click
Remove.
6. Click OK. The system displays a two-headed icon for each permission assigned to the role you
selected.
2. On the Edit menu, click Properties. The Role Properties dialog box appears.
Note: You can also double-click a role to display the Role Properties dialog box.
5. Click Add. The selected users appear in the Assigned Users list.
Note: To remove a user, select one or more users in the Assigned Users list and click
Remove.
2. On the Edit menu, click System Access Permissions. The System Privileges dialog box
appears.
4. Click Add.
5. Click OK.
The System Access Permissions are assigned to the selected user or role.
When you are viewing user system privileges, select the Summarized tab to view all system
privileges assigned to the user either directly or by a role. You cannot add or remove privileges
from this tab, and it does not appear when viewing role system privileges.
2. In the Security Administration window, click Active Directory > Configure. The Configure
Active Directory dialog box appears.
3. Click to select the Enable Active Directory Authentication check box. The next three
selections become editable.
4. Set Windows Workstation SSO to Enabled if you want to use the SSO login free access
feature. Otherwise, select Disabled.
5. Ignore the Login Page Default Domain Selection option. You must add the Active Directory
service users before you select the default domain (covered in the section Providing Access to
Metasys System for Active Directory Service Users).
6. Using the Active Directory Service Account(s) option, add one or more service account
users who have authentication rights to the Active Directory service users you want to add.
A username and password for each service account is required. Also, before you can save or
apply these changes, you must specify at least one service account and the service account
must currently exist on the Active Directory service domain. (For details on service accounts,
see Service Account.)
7. Click Save or Apply to save your changes. Clicking Save returns you to the Administration
screen, which now has Active Directory Users as a new folder in Roles and Users.
2. On the Main screen, click Tools > Administrator. The Security Administration window appears.
3. On the Insert menu, click Insert Active Directory User. (You can also click the Add Active
Directory User icon or right-click the Active Directory folder and then click Insert.) The Add
Active Directory User dialog box appears.
4. Specify the Active Directory User Name using the fully qualified username format
([email protected]). Although the dialog reminds you to add the user to the MSEA-SSO
5. Click Add. The Metasys system communicates with Active Directory services to verify this user.
If the domain provided is not a recognized Active Directory service domain or it is not in the
correct format, the message Active Directory Service Account Authentication
Failed appears.
If the domain name is correct but the new user cannot be found by Active Directory services,
the message Error encountered: Error in Authenticating Active Directory User
appears.
If the new user is verified, the new user is added to the Active Directory Users folder in the
Roles and Users tab (see Figure 31).
6. Open the user properties for the new Active Directory service user, fill in the information using
Table 15, and then click OK.
7. Assign access permissions to the Active Directory service user in the same manner as you
would for a Metasys local system user. For details, see System Access Privileges.
3. On the Security Administration window, click Active Directory > Configure. The Configure Active
Directory dialog box appears (Figure 27).
4. Using the Login Page Default Domain Selection option, select the domain that the Metasys
SMP UI presents as the default selection on the Metasys login screen. This default applies to
all users, regardless of a particular user’s domain; therefore, if multiple domains are used, you
may want to select the domain that applies to the majority of users.
5. Click Save or Apply to save this change. Clicking Save returns you to the Security
Administration screen.
Removing User Access to Active Directory Service from the Metasys System
1. Log in to the ADS/ADX or SCT with a Metasys Administrator account. On the Main screen, select
Tools > Administrator. The Security Administration window appears.
2. Select the Active Directory service user you want to remove as a Metasys system user. On the
Security Administration window, click Edit>Delete.
3. Click Yes to confirm the user deletion. This Active Directory service user is removed as a
Metasys system user and the Active Directory User list is refreshed.
2. Select the Active Directory service user whose access to the Metasys system needs to be
suspended.
3. On the Edit menu, click Properties. The User Properties tab of the User Properties dialog box
appears (see Figure 14).
5. Click OK.
The Active Directory service user is prevented from logging in to the system. If the user is cur-
rently logged in, the Metasys system terminates the user’s session immediately. To re-enable
Metasys system access for an Active Directory service user, clear the Metasys Access Sus-
pended check box.
2. On the Main screen, click Tools > Administrator. The Security Administration window appears
(Figure 31).
- The following message appears the first time you try to synchronize a user who has
been deleted as an Active Directory service user, but remains a user in the Metasys
system: This user was deleted from Active Directory but remains in
the Metasys System.
2. In the Security Administration window, click Active Directory > Configure. The Configure
Active Directory dialog box appears (Figure 27).
3. Clear the Enable Active Directory Authentication check box. This step prohibits the three
Active Directory service selections from being edited.
4. Click Save or Apply to save your changes. A dialog box appears asking you if you want to clear
all service accounts (Figure 32).
- Click Keep if you want to retain all service accounts and intend to temporarily disable
Active Directory service authentication to the Metasys system. The list of selected service
accounts remains intact.
- Clicking Clear or Keep returns you to the Security Administration screen, which now
2. On the SMP UI screen, select Tools > Administrator. The Security Administrator window
appears.
3. In the Security Administration menu, click RADIUS. The Configure RADIUS screen appears.
4. Select the Enable RADIUS Authentication check box to enable the fields on the Configure
RADIUS screen.
5. Fill in the fields of the Configure RADIUS screen using the information in the following table.
6. Click Save.
Note: At any time, RADIUS may be disabled by clearing the Enable Radius
Authentication check box and applying or saving the configuration. While RADIUS is
disabled, only local users can authenticate. Login errors display when a user attempts to
log in with a RADIUS account.
2. On the SMP UI screen, select Tools > Administrator. The Security Administration window
appears.
- Many fields appear dimmed when you add a RADIUS user account because they are
controlled by a RADIUS server. These fields include: Password, Verify Password, View
Blocked Words List, View Password Policy, Min Password Length, Max Password Length,
User Must Change Password at Next Logon, and User Cannot Change Password.
5. Review the selections in the remaining tabs to ensure that the appropriate Metasys
authorization is assigned to the user. Then click OK. Once you add a new RADIUS user, the new
user account is opened to the Access Permissions page.
Note: The Maximum Password Age and Password Uniqueness fields on the Account
Policy tab do not apply to RADIUS users because those features are handled by the
RADIUS server.
RADIUS Errors
This section describes some situations that may result in error messages after enabling RADIUS
to authenticate user login credentials. When the server and network engines are not configured
for RADIUS authentication, the standard Metasys login error messages appear. When the server
and network engines are configured for RADIUS authentication, RADIUS errors are intentionally
obscured to hinder possible intrusion from unauthorized users. If you encounter these errors and
cannot resolve them, contact your local network administrator. The two figures in this section are
examples of the general RADIUS error messages.
The RADIUS error message Fail appears in any of the following scenarios:
• The RADIUS server is not online or available when the non-local (RADIUS) user tries to log in to
the Metasys system.
• The server or network engine is configured to communicate with a RADIUS server, but the
RADIUS server is unavailable and therefore does not respond to a login request from the non-
local user.
• The non-local user's account is disabled, either in the Metasys system or in the RADIUS server.
• The non-local user's account password does not meet the Metasys system password complexity
requirements.
• The RADIUS server is enabled, but the Metasys local user account the operator is using is
disabled, locked out, or cannot log in because the user's timesheet does not permit login at this
time.
• The RADIUS server is enabled, but the Metasys local user account the operator is using is
entered incorrectly.
The RADIUS error message Invalid Credential appears if you try to log in to a server or
network engine with a non-complex password and RADIUS is not enabled.
User Label Account Purpose Default Account Database Name Database Role
Name Membership
XMS DB User Read/write site ads-user XMS db_owner
configuration
information
Historian DB User Read/write the ads-user JCIHistorianDB db_owner
historical (trend)
database
Events DB User Read/write the ads-user JCIEventsDB db_owner
events database
Audit DB User Read/write the ads-user JCIAuditTrails db_owner
audit database
Security DB User Authentication/ g3-AuthUser MetasysIII db_owner
authorization
service uses
to retrieve
authentication
and authorization
information
from the security
database
User Label Account Purpose Default Account Database Name Database Role
Name Membership
Annotation DB Annotation ads-user JCIItemAnnotation db_owner
User database uses
to read/write
annotations in
MVE
1 In a split ADX configuration, the Advanced Reporting component uses the g3-MetasysReportServer account to access
1
data on the ADX data server through a linked server connection in the ADX database.
Note: These user names are created at Metasys 8.1 and earlier.
Integrated Authentication
The ADS/ADX services do not use integrated authentication. SCT has two virtual service accounts,
IIS APP\MSEA_SCT_APPPOOL and NT SERVICE\MIIISCTAQ, that uses integrated authentication. The
access passwords are managed through Windows and the access password can not be changed.
2. Run the DBCCT to update the database connection strings of the components that use the
modified accounts.
3. In the SQL Server Management Studio, modify the password of the desired SQL Server login
accounts.
Metasys Services
Metasys software installs Windows services. These services include:
• Device Manager (MetasysIII Device Manager)
2. Right-click stop.bat and select Run as Administrator. Click Yes in the User Account Control
dialog box. A Command Prompt windows appears and displays the status of the services.
When the services stop, the Command Prompt window closes.
Note: You can also use the batch file to restart services on the ADS. For further
information, refer to the ADS/ADX Commissioning Guide (LIT-1201645).
3. Select UI_AppPool.
The Application Pool Tasks pane appears.
4. Click Stop.
4. Click OK.
This saves all changes to the configuration files and affects all user names and passwords
in the ADS/ADX. Reset restores all user names and passwords to their values at the time
the tool opened. These values may be different form the installation defaults if DBCCT was
previously run. Reset restores all user names and passwords. Cancel or X cancels all pend-
ing changes.
Note: OK only saves the connection strings to the configuration file. The ADS/ADX
web services running under IIS still cache the old connection values. You must
manually reset IIS after closing the tool. This allows the web services to reload the new
connection data.
6. In SQL Server Management Studio, change the Security Logins passwords to match the ADS/
ADX passwords.
4. Update the g3-MetasysReportServer password to match the password you entered in Step 2.
5. Click OK.
5. Right-click a user whose password was changed in DBCCT and select Properties.
8. Repeat Steps 5 and 6 for all users whose password was changed.
Server Name
The ADS DB Server field contains the name of the SQL server that hosts the ADS/ADX databases. In
a single box ADX, the name is the same as the application server. In a split ADX configuration, this
field contains the database server name. This field format is the standard SQL connection string
syntax. Metasys supports using SQL Server that has named instances.
Table 31: Server Names
User Names
User names are the login names from the server instance specified in the Server Name field. DBCCT
does not validate the user names. You can enter any length name with the exception of the SQL
login names, which are limited to 115 characters (SQL Server 2005).
Table 32: DBCCT Dialog Field Details
Field Description
XMS DB User The user name used by the ADX to access the site configuration
database (XMS).
Historian DB User The user name used by the data access service to access the historical
(trend) database (JCIHistorianDB).
Events DB User The user name used by the data access service to access the events
database (JCIEventsDB).
Audit DB User The user name used by the data access service to access the audits
database.
Security DB User The user name used by applications to access the security database
(MetasysIII), to authenticate and authorize the end-user or calling
process.
Annotation DB User The user who connects to the annotation database (JCIItemAnnotation).
ARS DB User The database user name impersonated by advanced reporting services
(ARS) to obtain access to the databases. This user name is read-only.
You cannot change this username.
ARS Reporting Service This link launches the Microsoft SQL Server Reporting Services (SRRS)
Data Link Configuration configuration screen, where you set the reports data source access
password. Do not change the user name, only the password.
Note: When you save the password, the change is made even
though the DBCCT dialog cancels.
Status Messages
Status Messages appear in the DB Connection Parameters Status section.
Message Description
Ready The tool is ready for action.
Metasys III Device Manager The device manager is running. You can not
update the connection configuration until
you stop device manager and relaunch the
application.
Error opening/reading configuration file The connection configuration is locked by
another process or missing and can not open
for reading.
Error writing to the configuration file The connection configuration is locked by
another user or missing and can not open for
writing.
Restarting Services
1. After the DBCCT closes, reboot the system.
2. Verify that the services you stopped in Stopping Metasys Services on the ADS are restarted.
© 2018 Johnson Controls. All rights reserved. All specifications and other information shown were current as of document
revision and are subject to change without notice