BM Cimplicity Security Master
BM Cimplicity Security Master
Security Features
No part of this publication may be reproduced in any form, or stored in a database or retrieval system, or transmitted or distributed in any
form by any means, electronic, mechanical photocopying, recording or otherwise, without the prior written permission of General Electric
Company. Information contained herein is subject to change without notice.
Trademark Notices
GE, the GE Monogram, and Predix are either registered trademarks or trademarks of General Electric Company.
Microsoft® is a registered trademark of Microsoft Corporation, in the United States and/or other countries.
We want to hear from you. If you have any comments, questions, or suggestions about our documentation, send them to the following email
address:
[email protected]
Security
Chapter 1. About Security and Routing............................................................................................5
Chapter 2. Resource Configuration................................................................................................... 6
About Resources............................................................................................................................ 6
Resource Configuration..................................................................................................................6
Resource Configuration..........................................................................................................6
Step 1. Open a Resource Definition Dialog Box.................................................................. 7
About Roles..................................................................................................................................10
Role Configuration....................................................................................................................... 10
Role Configuration............................................................................................................... 10
About Users..................................................................................................................................24
About CIMPLICITY Passwords..................................................................................................24
Windows Authentication Configuration...................................................................................... 25
User Configuration............................................................................................................... 33
Step 1. Open a User Properties Dialog Box........................................................................33
CIMPLICITY security features in the Workbench left pane include the following.
Feature Description
Users Configure users for a CIMPLICITY project.
Roles Create roles with assigned privileges. The role that is assigned to a user determines what the user can
do in a CIMPLICITY project.
Remote Defined to retrieve point information from projects running on other computers.
projects
Client Configure default log ins for CIMPLICITY viewers on client computers.
Chapter 2. Resource Configuration
About Resources
Resources are the physical or conceptual units that comprise your facility. They can be devices,
machines, or stations where work is performed, or areas where several tasks are carried out. Resource
configuration plays an important role in your CIMPLICITY project by routing alarms to specific
users and filtering the data users receive.
Resource Configuration
Resource Configuration
The Workbench right pane displays the following attributes for each Resource.
Attribute Description
Resource A name that uniquely identifies each resource.
Description Text that gives users more information about the resource.
Resource Identifies the type of resource. CIMPLICITY software currently supports two resource types: SYSTEM,
Type and RESOURCE. This is a display-only field and cannot be modified. Any resources you create are
automatically given a Resource Type of RESOURCE.
Alarm Mgr Identifies the Alarm Manager process that receives alarms for this resource. This is a display-only field
and cannot be modified.
Note: Use the Workbench Field Chooser to remove or re-display any of the fields, except the
Resource. The Resource is required.
The Resource list is initially sorted by Resource. You can click on any of the other column titles at
the top of the list to sort the list by that attribute.
Item Description
A Click File>New on the Workbench menu bar.
Item Description
C In the Workbench left pane, either double-click Resources, or right-click Resources and select New on
the Popup menu.
D
In the Workbench right pane, right-click any resource and select New on the Popup menu.
4. Click OK.
The system verifies that the Resource ID does not already exist, and that no invalid characters have
been used. If the Resource ID you entered is valid, the Resource Definition (page 8) dialog box
for the new resource opens.
Action Description
A Click Edit>Properties on the Workbench menu bar.
D In the Workbench right pane, either double-click a resource, or right-click a resource and select
Properties on the Popup menu.
Description
Add
Remove
Properties
1. Select the user in either the Available users or Users for this resource box.
2. Select Properties.
New
The new user is added to the Available users or Users for this resource box for the selected
resource.
Chapter 3. Role Configuration
About Roles
Each user in CIMPLICITY is assigned a role.
A role specifies what privileges its users have when they work in CIMPLICITY . Types of privileges
include:
Note: The CIMPLICITY default configuration includes the following three roles:
• SYSMGR
• USER
• OPER
Role Configuration
Role Configuration
Step 1 Open a role's Role Properties dialog box.
(page
10)
The Workbench right pane displays the Role ID for each Role.
Action Description
A Click File>New on the Workbench menu bar.
C In the Workbench left pane, either double-click Roles, or right-click Roles and select New on the
Popup menu.
D
In the Workbench right pane, right-click any role, and select New on the Popup menu.
4. Click OK.
The system verifies that the Role ID does not already exist, and that no invalid characters have been
used. If the Role ID you entered is valid, the Role Properties dialog box for the new role will open.
Tip: You can also open the Role Properties dialog box through the Point Properties dialog box.
Item Description
A Click Edit>Properties on the Workbench menu bar.
Security | 3 - Role Configuration | 12
Item Description
B Click the Properties button on the Workbench toolbar.
D In the Workbench right pane, either double-click a role, or right-click a role and select Properties on the
Popup menu.
Tip: You can also open a Role Properties dialog box for an existing role through the Point
Properties dialog box.
You can assign privileges to each role in each of the following categories.
Note: Many of the tabs that can be available in the Roles Properties dialog box display only
when the option they apply to is enabled.
The Privileges tab on the Role Properties dialog box let you define the application privileges for a
new role.
Step Description
1 General.
(page
13)
2 Alarms.
(page
14)
3 Runtime.
(page
14)
4 Change approval.
(page
16)
5 Event manager.
(page
16)
6 Level.
(page
16)
7 Points.
(page
17)
8 OPC UA.
(page
17)
1. General
Check the check box for each privilege you want to assign to a role.
Privilege Description
Dynamic configuration Enable Dynamic Configuration from functions in the Workbench.
Security | 3 - Role Configuration | 14
Privilege Description
Process Control Use the CPC (CIMPLICITY Program Control) utility to start and stop CIMPLICITY processes.
2. Alarms
Check the check box for each privilege you want to assign to a role.
Privilege Description
Delete alarms Delete alarms from the Alarm Viewer.
3. Run time
A role's ability to open processes through the following windows can be limited, based on whether or
not you check Right-click menu and/or Point Target.
Richt-click menu
Right-click menu authorizes the role to display Popup menus, as follows.
Checked A Popup menu displays. Processes that can be opened through the Popup menu include:
• Add a project.
• Remove a project.
• Open the Point Control Panel.
• Open a quick trend.
Note: Point Target must also be checked for Point Control Panel and quick trend.
CimView
Security | 3 - Role Configuration | 15
Note: Point Target must also be checked for Point Control Panel and quick trend.
Checked A Popup menu displays. Processes that can be opened through the Popup menu include:
Note: Point Target must also be checked for Point Control Panel and quick trend.
Note: System Sentry displays Popup options the same as other CimView screens.
Important: If you are connected to multiple projects, e.g. through the Point Control Panel, you
can display the Popup menu only if your role is authorized to do so in all of the projects.
For projects that are in CIMPLICITY versions less than 7.0, the authorization is assumed to be True.
Point target
Checking Point target enables users to display the Point Control Panel and Quick Trends.
Popup menus and toolbar buttons that provide access to these features display based on whether
Point target is checked or clear are as follows.
• When Point target is checked Point Control Panel and QuickTrends are listed on the right-click
Popup menus in:
◦ Alarm Viewer OCX
◦ CimView
◦ Point Control Panel
◦ System Sentry
• When Point target is checked Point Control Panel and Quick Trends buttons display on the
Point View toolbar when Point View (page ) is opened through a CimView screen.
4. Change approval
Privilege Description
Verify Electronically verify a setpoint action for points and/or alarms that require electronic signatures for both
the setpoint performer and a verifier.
5. Event Manager
Privilege Description
Trigger Event Trigger Event Manager events from the Basic Control Engine user interface.
Script Control Stop, pause, or resume scripts in the Event Manager from the Basic Control Engine user interface.
6. Level
Enter a number to indicate the level at which the role can set points.
Level security affects all writable attributes of the point, including alarm limits, quality attributes,
raw value, etc.
Each point can be assigned a level on the advanced General tab in the Point Properties dialog box. A
role with a level equal to or higher than a point level can set the point.
• Can set any points with a level that is lower or equal to 10.
7. Points
Privilege Description
Set point Perform setpoints from CimView screens that contain Setpoint actions.
Setpoint Audit Trail Have a $DOWNLOAD event recorded in the Event Log for each
setpoint that is generated. When you enable the Setpoint Audit Trail,
the information sent to your Event Log can provide a detailed audit
trail of which users set which setpoints. However, the audit trail
imposes significant overhead (20 times slower) since a record is
logged in the database for each setpoint. This is particularly noticeable
when a user performs setpoints in a loop in the Program Editor. If you
do not require an audit trail for setpoints, it is recommended that you
disable the Setpoint Audit Trail option.
Note: The audit trail logs data in device units. You can use the
global parameter EU_AUDIT_TRAIL to have CIMPLICITY log the data
in EU and measurement unit converted values.
Default Disabled
Disable / modify alarms Disable or modify a point's alarms in the Point Control Panel.
Modify Attributes Change the MANUAL_MODE point quality attribute. Change the
QUALITY.DISABLE_WRITE point attribute. Write to a user defined
field attribute if Restrict write by role is checked in the Field Attribute
dialog box.
8. OPC UA
Privilege Description
OPC UA Select this option to allow an admin user to remotely manage the OPC UA security configuration for
server CIMPLICITY projects. This includes: configuring server certificates, updating trust lists, restarting the
admin OPC UA Server, shutting down the OPC UA Server, and viewing diagnostic information about the OPC
UA Server. When you select this option, you will need to restart your CIMPLICITY project.
Default Disabled
The Calendar tab in the Role Properties dialog box is available if your CIMPLICITY product has the
Action Calendar option enabled.
Check the check box for each privilege you want to assign to a role.
Security | 3 - Role Configuration | 18
Configuration Checked Configure a schedule for any areas that can be seen
Important: You need to activate configuration security to display the Configuration tab in
the Role Properties window. Configuration security will require users to logon to a CIMPLICITY
project. Therefore, their privileges will be affected by the roles to which they are assigned.
You activate security by selecting the Configuration Security check box in the Options tab of the
Project Properties window. The Configuration tab in the Role Properties window enables you to
specify the type of configuration privileges available to users who are assigned to the role. Select the
check box for each privilege you want to assign to a role.
Note: If you clear the Alarms check box and select the Points check box, you cannot configure
and modify alarms from Alarm Navigation. However, since you have the privilege to create points,
you can configure and modify alarms from the Point Properties window.
The Broadcast tab in the Role Properties dialog box is available if your CIMPLICITY product has
the Order Execution Mgt. Broadcast option enabled.
Check the check box for each privilege you want to assign to a role.
Privilege Description
Add/Publish Add/publish a WYSIWYG, ASCII or Control Character Token (CCT) form to the list of available
Broadcast forms.
Save As Defaults Save WYSIWYG form object configurations as defaults for objects that are placed on a form after
the defaults are saved.
Compile Compile a Control Character Token file, ASCII form or WYSIWYG form.
Test Test an ASCII or WYSIWYG form with data to make sure it has the correct layout and
configuration.
Privilege Description
Configure generic Configure job fields in the Broadcast Queue Manager.
fields
Job Queue limits Set queue limits in the Broadcast Queue Manager.
Pause job Pause selected active jobs that are in the Broadcast Queue Manager printing queue.
Requeue job Re-queue selected archived jobs in the Broadcast Queue Manager
Resend job Resend selected history jobs in the Broadcast Queue Manager
Reset devices Reset devices, after they have been paused, so the Broadcast Queue Manager will send them
forms.
Reset sequence Reset the device group sequence number in the Broadcast Queue Manager.
number
Resume device Resume a device after it has been paused in the Broadcast Queue Manager.
Resume job Resume printing of jobs that have been paused in the Broadcast Queue Manager.
Send adhoc Send an adhoc broadcast through the Broadcast Queue Manager.
broadcast
The TQE tab in the Role Properties dialog box is available if your CIMPLICITY product has the
Order Execution Mgt. Query Engine option enabled.
Check the check box for each privilege you want to assign to a role.
Privilege Description
Configuration Create or modify expressions.
The TADB tab in the Role Properties dialog box is available if your CIMPLICITY product has the
Order Execution Mgt. TADB option enabled.
Check the check box for each privilege you want to assign to a role.
Privilege Description
Configuration Create or modify Tracker item types, groups and/or attributes in the TrackerCfg UI
The Tracker UI tab in the Role Properties dialog box is available if your CIMPLICITY product has
the Tracker option enabled.
Note: In some versions previous to CIMPLICITY v7.0, Role privileges for Tracker UI and RCO
UI were incorrectly recorded. This has been corrected in CIMPLICITY 7.0. However, it would be
prudent to double-check that the privileges have are correctly checked or clear for each role.
Privilege Description
Add/Insert Add or Insert an item to a region.
Item
Modify Item Modify an item into a region. Important: If you clear Modify Item the following privileges will also be
unavailable (even if they are checked in the Roles Properties dialog box).
• Add Attribute
• Delete Attribute
• Modify Attribute
• Item Set/Clear Active
Find Item Find an item in the PRT database using the PRT_UI
Advance Item Advance an item to the next region using the PRT_UI.
Privilege Description
Item Set/ Activate or de-activate an item's status in a region, e.g. delayed, external hold, internal hold and
Clear Active normal.
Add Named Add named hold flags through Object Model scripting
Hold Flag
Autolock Automatically lock the region so you can perform operations on items within the region whenever you
region want.
Query NA
• When the script is run the first time it adheres to the role privileges that have been set in the
Roles dialog box.
• When the script has run once in the CimBasic Editor it is added to the cache. Even if the role
privileges are changed dynamically, the script will continue to run as written adhering to the
role privileges that were assigned when it was first run. While the script is in the cache, it does
not honor the dynamically changed role privileges.
The script will continue to perform Modify Named Hold Flag, as specified, while it is in the cache.
The RCO UI tab in the Role Properties dialog box is available if your CIMPLICITY product has the
Tracker RCO UI option enabled.
Check the check box for each privilege you want to assign to a role.
Note: In some versions previous to CIMPLICITY v7.0, Role privileges for Tracker UI and RCO
UI were incorrectly recorded. This has been corrected in CIMPLICITY 7.0. However, it would be
prudent to double-check that the privileges have are correctly checked or clear for each role.
Each of these features has a related menu item in the RCO_UI, which will be disabled if the
corresponding check box is clear.
Privilege Description
Enable/Disable site Enable or Disable control sites.
About Users
The Users application enables you to configure users for your CIMPLICITY project.
The privileges and resources that CIMPLICITY offers a user is determined by one of the following.
Windows Authentication
Authenticated Windows groups can be selected and assigned roles and resources.
Note: The first user you create when starting a new project is assigned the SYSMGR role.
Beginning with CIMPLICITY 9.5, this user must be assigned a password. See About Cimplicity
Passwords (page 24) for details on password complexity.
• Password complexity rules are set for the entire project, not on a user-by-user basis.
• Case-sensitive passwords must have a least one uppercase letter and one lower case letter.
Security | 4 - User Configuration | 25
• If you have a project that has case-insensitive passwords and you change the project to case-
sensitive passwords, those existing passwords must now be entered in all uppercase letters.
Numerals and special characters do not change.
• When creating a project and creating user accounts, you must assign each account a password.
However, when logging in at a later time with SYSMGR privileges, you can create new users
without passwords. This is not recommended.
• If you set up a project with case-sensitive passwords and then change to case-insensitive
passwords, your existing mixed case passwords must be entered in mixed case as they were
originally created. However, any new passwords you create are case insensitive.
• It may be best to leave already existing projects with case-insensitive passwords.
Windows authenticated users can use their Windows user name and password when logging into
CIMPLICITY if they are members of selected Windows groups.
Do the following to select and configure the groups that CIMPLICITY will use for authentication.
rect 81, 36, 110, 64 Step 2. List Groups in a Selected Domain (page 26)
rect 81, 213, 110, 241 Step 6. Enable Automatic Log Ins (page 29)
rect 259, 0, 288, 28 Step 1. Open the Windows Authentication Window (page 26)
rect 276, 91, 305, 119 Step 3. Select Groups that will be Authenticated for CIMPLICITY (page
28)
rect 394, 57, 423, 85 Step 5. Prioritize Groups (page 28)
rect 331, 194, 360, 222 Step 4. Map a Role for each Group (page 28)
rect 393, 238, 422, 266 Step 7. Save or Cancel the Windows Authentication Configuration (page
32)
Step Description
Step 1 Open the Windows Authentication window.
(page
26)
Step Description
Step 5 Prioritize groups.
(page
28)
Action Description
A Click Edit>Properties on the Workbench menu bar.
C In the Workbench left-pane either double-click Domain, or right-click Domain and select Properties
on the popup menu.
D In the Workbench left-pane either double-click Domain, or right-click Domain and select Properties
on the popup menu.
Do the following.
B Load Groups Click Load Groups. Domain groups are listed in the Available Groups box.
C Available (Optional) Enter a string in the field to list only groups that contain the string in some part of
Groups the name.
Windows users groups that have been defined for the selected domain are listed in the Available
Groups list. If a string has been entered to filter the list, only the groups that include the string are
listed.
You must have a valid domain User name/Password to list a domain's groups.
If you have not logged into windows with a valid domain username/password, a Windows
Authentication error message box opens reporting the issue, as follows.
The current user that is logged into the computer does not have permission to query the windows
domain.
Please provide credentials, with access to query the domain. These credentials will NOT be saved for
any other purpose.
1. Select OK.
The Windows Authentication error message window closes. A Login window opens.
2. Enter valid Username and Password credentials for the selected domain.
3. Select OK.
The following occurs based on whether or not the entered domain login credentials are valid.
Login Result
Valid The domain's available groups are listed.
• The speed at which the groups load depends on the domain size and your network speed.
• While CIMPLICITY is loading the groups, the window will be gray.
Security | 4 - User Configuration | 28
Available Groups
2. Select Add.
The group is added to the selected groups list.
Selected Groups
2. Select Remove.
The group is removed from the Selected Groups list.
A Mapping dialog box opens displaying the roles that are currently in the project configuration.
3. Do the following.
a. Check one role.
b. Check the resources to which the role will have access.
CIMPLICITY:
• Looks for the user starting with the first group in the Selected Groups list and moving down.
• Assigns the role/resources to the user that are assigned to the first group in which the user is
found.
List the groups in the order of priority; the first group is the highest priority.
Select a group and click Move Up or Move Down to change its order in the list.
Windows authentication can be enabled or disabled whether or not Windows groups have been
selected in the Windows Authentication window.
The following steps describe how to enable Windows Authentication in CIMPLICITY, and the
options available when you do (Allow Configuration Auto Login and Allow Auto Login).
Note: If only Enable Windows Authentication is selected and if the Windows user is a
member of a selected group, CIMPLICITY will:
• Open a CIMPLICITY Login dialog box.
• Check the Windows/password credentials.
• Look for the user in the Selected Groups.
• Give the user CIMPLICITY/Proficy Change Management (PCM) access based on the first
group in which the user is found.
Allow Configuration
Allow Auto Login Description
Auto Login
Checked Clear
If the Windows user is a member of
a selected group, CIMPLICITY will:
• Look for the user in the
Selected Groups.
• Automatically log in the user
to CIMPLICITY based on the
first group in which the user is
found.
• Assign the user the role/
resources assigned to that
group. Users have to manually
log into CIMPLICITY to do
configuration if CIMPLICITY
Configuration Security is
enabled and to manually
log into Proficy Change
Management (PCM).
Users have to:
• Manually log into CIMPLICITY
to do configuration if
CIMPLICITY Configuration
Security (page ) is
enabled.
• Manually log into Proficy
Change Management
Allow Configuration
Allow Auto Login Description
Auto Login
Clear Checked When Windows Authentication is
enabled, Windows Authentication:
• Reads the current logged in
Windows user.
• Does the following if the user is
new to CIMPLICITY/not listed
in the project:
◦ Prompts the user for a
CIMPLICITY valid name/
password.
◦ Creates a CIMPLICITY
user based on the valid
name/password.
◦ Assigns the user the role/
resources assigned to the
Windows Authentication
group that the user is in.
◦ Automatically logs the
user into CIMPLICITY
based on the first Windows
Authentication group in
which the user is found.
◦ Automatically logs the
user into CIMPLICITY
based on the first Windows
Authnetication group in
which the user is found.
Users are:
• Automatically logged
into CIMPLICITY to do
configuration even if
CIMPLICITY Configuration
Security (page ) is
enabled.
• When a user:
◦ Attempts to log into CIMPLICITY, if the Windows user name/password are not valid or
CIMPLICITY does not find the user in any of the groups, the user is denied CIMPLICITY
access.
◦ Logs into CIMPLICITY for the first time using Windows authentication, that user is
automatically added to CIMPLICITY's list of users.
◦ Is listed in the CIMPLICITY list, user specifications can be modified the same way as for
any other user.
• When the new Windows Authentication module tries to validate a user with auto log in, If
Windows Authentication does not have a valid user/password to use to query the domain
controller, it uses the current user that the process is running under.
On a default installation Windows authentication runs as a system user; depending on how the
domain is set up there is a good chance that the system user will not have the ability to query the
domain.
Button Description
OK
• Saves this session's configuration
• Closes the Windows Authentication window.
Cancel
• Cancels this session's configuration
• Closes the Windows Authentication window.
Note: If Windows Authentication was previously configured, the previous configuration is used.
Security | 4 - User Configuration | 33
User Configuration
User Configuration
1. To review exiting users, expand the Security folder in the left pane of the Workbench.
2. Select Users.
The Workbench right pane can display the following attributes for each User.
Attributes Description
User ID A name that uniquely identifies each user.
Role ID The role assigned to the user. This determines the privileges assigned to the user.
Note: Use the Workbench Field Chooser to remove or re-display any of the fields, except
the User ID. The User ID is required.
The User list is initially sorted by User ID. You can click any of the other column titles at the
top of the list to sort the list by that attribute.
Note: Beginning with CIMPLICITY 9.5, you must assign a user name to the first user you create
when beginning a new project. This first user is assigned to the SYSMGR Role (page 10) by default.
By default, the SYSMGR role is granted the most privileges.
Action Description
A Click File>New on the Workbench menu bar.
C In the Workbench left pane, either double-click Users, or right-click Users and select New on the
Popup menu.
4. Click OK.
Security | 4 - User Configuration | 35
The system verifies that the User ID does not already exist, and that no invalid characters have
been used. The User Properties dialog box opens is the User ID is approved.
2. Open the Properties dialog box for the existing (page 35) user.
Action Description
A Click Edit>Properties on the Workbench menu bar.
D In the Workbench right pane, either double-click a user or right-click a user and select Properties on
the popup menu.
The General tab on the User Properties dialog box lets you define the following for a new user:
1. Role
2. Authentication Type
3. Password/Confirm password
4. User name
5. Enabled
6. Password expires
Security | 4 - User Configuration | 36
Note: If you change a user's configuration dynamically, the user must log out then log back in
for the changes to take effect.
Role
1. Select to the right of the input field to display the Select A Role window and use it to select the
role.
2. Optional: Select to create a new role, edit the current role, or browse for another role.
Authentication Type
Select one of the following procedures that CIMPLICITY should perform to authenticate a user
when the user logs in:
Selection CIMPLICITY allows access
None With no password.
CIMPLICITY When the user enters the name and password that are in
the Users dialog box.
1. When CIMPLICITY is selected as the Authentication Type, enter the user's password in the
Password box.
The user is not prompted to change his or her password at runtime when the following are
selected as the Authenticated Type:
CIMPLICITY allows
Selection
access when the user enters:
None No password.
Windows Domain with Group Mapping The user's authorized Windows password.
User Name
Optional: Enter the user's name or descriptive text about the user.
Enabled
Either:
When Enabled is unchecked, the account is not available for user login.
Security | 4 - User Configuration | 38
Note: If you disable an account dynamically, currently logged in users will not be logged out;
however, new log in attempts will be rejected.
Password expires
After the elapsed number of days, the user will be required to change the password prior to logging
in.
The Resources tab in the User Properties dialog box enables you to define the resources for which the
user can view alarms. The resources currently assigned to the user are displayed on the Resources tab
in the User Properties dialog box. You can add or remove resources for the selected user.
Add
Add All
Remove
Notes
• If you change a user's resources dynamically, the user must log out then log back in to access
the changed resources.
Security | 4 - User Configuration | 39
• You can also use the Shift and Ctrl keys in combination with the mouse to select more than one
resource for deletion.
3. Select Users.
4. Select Settings.
The User Setup dialog box opens.
CIMPLICITY can be configured to automatically disable a user account after a selected number of
failed log in attempts.
• No account disable
• Account disable
Enables:
◦ Automatic account disabling
◦ Disable after n bad logon attempts box.
Enter the number of log in attempts that can fail before CIMPLICITY disables the account.
Users will be allowed the specified number of log in attempts. If the number is exceeded
CIMPLICITY disables the user account and generates a $LOGIN_FAILURES event.
To re-enable the account, the system administrator needs to dynamically re-enable the user
account.
a. Select on the Workbench toolbar.
b. Open (page 35) the User's User Properties dialog box.
c. Re-enable (page ) the user account.
Note: Automatic account disabling is not supported on Servers using Server Redundancy.
Checked
When Secure is selected, CIMPLICITY will require users to create passwords with the rules you
select:
CIMPLICITY provides you with several options for configuring client properties that enable you to
restrict access from a client location.
Step Description
Step 1 Open a Node ID's Client Properties dialog box.
(page
42)
Action Description
A Click File>New on the Workbench menu bar.
C In the Workbench left pane either double-click Client, or right-click Client and select New on the
Popup menu.
D
In the Workbench right pane,
a. Right-click any client.
b. Select New on the Popup menu.
4. Click OK.
CIMPLICITY provides several methods to open an existing Client Properties dialog box.
Action Description
A Click Edit>Properties on the Workbench menu bar.
D In the Workbench right pane, either double-click a client, or right-click a client and select Properties on
the popup menu.
Choose one of the following four combinations of Default User Id field entries and Trusted check
box to control client access based on user identification.
In the Trusted
Default User Check Client Access
Option
ID Field Box
1 Enter a User ID Cleared Users from the Client computer with the default User ID are automatically
from the list of logged in.
users available
for the project.
2 Leave User ID Selected Users whose Windows Logon Username matches any CIMPLICITY User
blank. ID in the project are automatically logged in. All other users must enter a
User ID and Password (if required) in the CIMPLICITY Login dialog box.
3 Enter a User ID Selected Users whose Windows Logon Username matches the specified
from the list of CIMPLICITY User ID in the project are automatically logged in with that
users available User ID. All other users must enter a User ID and Password (if required) in
for the project. the CIMPLICITY Login dialog box.
4 Leave User ID Cleared All users from the Client computer must manually log into CIMPLICITY.
blank.
Tip: Click the Browser button to the right of the input field to open the Select A User Browser
and use it to select the User ID.
You can also click the Popup button , that provides you with the options to create a new user or
browse for an existing user.
Security | 5 - Client Configuration | 44
Important: The following is required to run the Generate Authorization Code utility.
2. Run the CIMPLICITY Genauthcode application on the client to find its unique Authorization
Code.
Item Description
A Open a Cmd window on the client PC.
C Code is generated.
Only the PC with the entered Authorization Code will automatically be logged in with the User ID
and/or Trusted specifications.
Either:
• Click OK to close the Client Properties dialog box and create the new client properties,
Or
• Click Cancel to close the dialog box without creating the new client properties.
Chapter 6. System Management
Review:
Logical names are used to override default values in the log_names.cfg file for the CIMPLICITY
Base System and options.
Note: Do not confuse logical names with environment variables. Logical names are found in the
log_names.cfg file, while environment variables are accessed through the Control Panel.
• Import/Export
• Log_names.cfg file.
CLIE_MAX_PTS
CLIE_MAX_PTS|S|default|5|5000
Point Management will accommodate "reasonable" periods of temporary growth in the use of system
memory, yet try to keep an errant client from causing Point Management to consume all resources.
You can use Point Management logical names to modify the parameters Point Management uses to
determine what is "reasonable".
BSM_PTM_AQ_OF_DELAY Number of seconds. If the number of seconds specified by this logical have transpired without
(page 47) any communication with a client and an attempt is made to queue another message to this
application, messages will be dropped. Note: Setting the BSM_PTM_AW_OF_DELAY value to
zero causes BSM_PTM_APPQ to be used as an absolute limit for dropping messages rather
than as a threshold at which burst/growth monitoring is initiated. The default is 50.
BSM_PTM_DCQ (page BSM_PTM_DCQsets the number of messages from a devcom that will be queued for processing in
47) Point Manager to 200 (default).
If: The internal threshold value for messages queued to a client is reached (possibly specified by BSM_PTM_APPQ),
Then: Point Management first checks the approximate period of time since communication occurred with that
application.
BSM_PTM_AQ_OF_DELAY
If: The period of time exceeds the number of seconds specified by BSM_PTM_AQ_OF_DELAY
Then: Point Management begins watching for continued growth, by keeping track of the number of messages a client
has consumed compared to the number of messages being queued for the client.
BSM_PTM_AQ_CNT4DROP
If: Point Management finds that growth has occurred in the number of periods specified by BSM_PTM_AQ_CNT4DROP,
Then: Point Management will start dropping records. Note that these periods are not required to be time consecutive,
that is, growth might be noted for three time consecutive periods, no growth for 2 periods, and then growth for
another three periods. It is when the maximum number of periods is exceeded that dropping will occur.
Then: It is expected that client applications will consume queued messages, and the internal lists will drop below the
threshold.
BSM_PTM_DCQ
If: If Point Manger receives a larger volume of messages from a devcom than set by BSM_PTM_DCQ.
Then: Increments of the System Sentry (performance) counter recording devcom queue overflows will periodically log
messages identifying Device communications occurrence queue overflow - <device>.
When messages drop below that threshold, a reset for the periods of growth count occurs. Counting,
therefore, starts over the next time the threshold is exceeded.
Security | 6 - System Management | 48
Log_names.cfg File
Where:
3. Type cd data .
5. Find the parameter you want to change, and make the change.
Note: When you are ready to implement the change in the runtime system, you will have to
stop and restart CIMPLICITY software.
When a user logs in to a project, the user is given the opportunity to save the Username and
Password used. When a user logs in to a project from a Viewer, the user is also given the opportunity
to request that the login occur automatically when the system reboots.
You can use the Login Panel utility to delete saved login information from the System Registry.
Step Description
1 Remove CIMPLICITY.
1. Remove CIMPLICITY
1. Open the Add or Remove Programs window in the Microsoft Windows Control Panel.
2. Select HMI/SCADA - CIMPLICITY.
3. Click Remove.
Do you want to completely remove the selected application and all of its features?
4. Click Yes.
A Setup Status window opens and reports the HMI/SCADA - CIMPLICITY removal; additional
messages report details during removal. When un-install is complete an Uninstall Complete
window opens.
Important:
• The following applications were removed.
◦ GE HMI/SCADA - CIMPLICITY
• The following applications were not removed.
◦ Microsoft SQL Server Express 2005
◦ Change Management Client API
◦ GE Historian Client
Security | 6 - System Management | 50
5. Do the following.
a. Check Yes, I want to restart my computer now.
b. Click Finish.
Note: You can wait until you remove remaining applications to reboot the computer.
However, the HMI/SCADA CIMPLICITY features that were removed will not be completely
uninstalled until you do reboot.
1. Open the Add or Remove Programs window in the Microsoft Windows Control Panel.
2. Find GE Historian.
The size that is reported for GE Historian depends on whether Historian Client only or Historian
with Historian Client are installed.
Size Description
1.17MB Historian Client only is installed.
When removal is complete an Uninstall Complete window opens providing the option to reboot or
not.
1. Open the Add or Remove Programs window in the Microsoft Windows Control Panel.
2. Find Microsoft SQL Server Express 2005.
3. (If no other applications are using Microsoft SQL Server Express 2005) Click Remove to start
the removal process.
When removal is complete an Uninstall Complete window opens providing the option to reboot or
not.
Security | 6 - System Management | 51
1. Open the Add or Remove Programs window in the Microsoft Windows Control Panel.
4. Click Remove.
1. Run Regedit.exe .
2. Open HKEY_CURRENT_USERS
3. Open Software
4. Expand GE Fanuc.
5. Delete CIMPLICITY
6. Open HKEY_CLASSES_ROOT
• .clg
• .gef
• CFGCab Document
• CimEdit
• CimEdit.Documents
• All file types starting with CIMPLICITY
• CimView
• CimView.Documents
• Default Device Property Sheet
• SNPDevice Property Sheet
• TCP IP Device Property Sheet
• VME Device Property Sheet
CIMPLICITY software provides you with the following security features to implement:
Login Passwords
• Select whether the user needs to enter a password in the CIMPLICITY Login dialog box.
Passwords are stored in an encoded format and are not directly readable by users.
• Set the password to expire after a given number of days. When the password expires, the user
will be required to change the password on the next login to CIMPLICITY.
• Configure a number of consecutive login failures. When this number is reached, the user's
account is disabled and a $LOGIN_FAILURE alarm is generated.
You can assign one Role to each User in a CIMPLICITY project. When you configure a Role in a
CIMPLICITY project, you can grant users assigned the Role permission to:
Security | 6 - System Management | 53
Setpoint Security
The Setpoint Security feature gives you the ability to enable or disable Setpoint capability for all
users who access your project. If you enable Setpoint Security, a user can perform setpoints on only
those points whose resources are in the user's view.
For an Enterprise Server project, Setpoint Security is enforced against the resource in the Enterprise
Server project if that project contains the same resources as the provider of the point. If the resource
is not configured on the Enterprise Server project, then Setpoint Security for the point is enforced
against the remote project's resource.
Setpoint Password
By default, run-time users have unrestricted access to the setpoint functions used by CIMPLICITY
software. If you enable the Setpoint Password option and enter a password, run-time users will be
prompted for this password whenever they invoke a setpoint function.
If you include Setpoint functions in Basic Control Engine scripts, and you enable the Setpoint
Password option, you must include the password in the function call.
The Security Audit Trail lets you monitor user actions in your project. It consists of a set of standard
alarms.
Security | 6 - System Management | 54
These alarms are included in your project configuration. They are all configured for:
• Delete on Acknowledge
• No Manual Clear
• Log on Generate
• Acknowledge immediately
• No stacking
By default, the Audit Trail alarms are logged in the Event Log table of the Database Logger. You can
choose whether you want to log each alarm. You can also choose to log each alarm in the Event Log
table or Alarm Log table. Finally, you can generate a report of Audit Trail alarms from the Database
Logger table.
The Point Control Panel alarm change alarms record the type of change, the Point ID being changed,
the CIMPICITY login user name of the user, the computer login user name of the user and the
computer name.
• $ALARM_DISABLED is generated when a user disables alarming for a point. The alarm message
contains the following information: Alarm detection disabled for: <point_id> by <user_id>
(<OS_user> @ <computer_name>)
• $ALARM_ENABLED is generated when a user enables alarming for a point. The alarm message
contains the following information: Alarm detection enabled for: <point_id> by <user_id>
(<OS_user> @ <computer_name>)
• $ALARM_MODIFIED is generated when a user modifies the alarm limits for a point. The alarm
message contains the following information: Alarm limits modified for: <point_id> by
<user_id> (<OS_user> @ <computer_name>)
• $ALARM_RESTORED is generated when a user restores the alarm limits for a point. The alarm
message contains the following information: Alarm limits restored for: <point_id> by <user_id>
(<OS_user> @ <computer_name>)
Setpoint Downloads
Security | 6 - System Management | 55
• CimView screens
• The Point Control Panel
• Recipes
The $DOWNLOAD alarm is generated when a user downloads a setpoint or a recipe. The alarm
message contains the following information:
When the $DYN_CFG alarm is routed to the correct role and configured for manual acknowledgement,
it notifies the configured role(s) each time a user makes a configuration change while Dynamic
Configuration is enabled.
The user, usually the administrator, to whom the alarm is routed will receive an alarm message.
Parameter Description
<type> Entity type being changed.
<user_id> CIMPLICITY login user name of the user making the dynamic configuration change.
<OS_user>@<computer_name> Computer login user name of the user making the dynamic configuration change.
Important: By default, $DYN_CFG is not routed to any role and is set to be automatically
acknowledged and delete on acknowledgement. Therefore, configuration is required if you want it to
be seen.
Step Description
Step 1 Make sure your role has alarm configuration privileges.
(page
56)
2. Select .
1. Select the Alarm Routing tab in the Alarm Definition - $DYN_CFG dialog box.
5. Click OK.
The next time a user performs a dynamic configuration $DYN_CONFIG will notify the selected
roles.
Project Login/Logout
The $LOGIN_FAILURE alarm is generated when a user fails to log in to a CIMPLICITY project
correctly and the number of consecutive login errors has been reached. The alarm message contains
the following information:
The $LOGIN alarm is generated when a user successfully logs in to a CIMPLICITY project. The
alarm message contains the following information:
The $LOGOUT alarm is generated when a user logs out of a CIMPLICITY project. The alarm
message contains the following information: