Operation Guide
Operation Guide
Security Editor
Operation Guide
Original instructions
EIO0000004105.03
12/2023
www.se.com
Legal Information
The information provided in this document contains general descriptions, technical
characteristics and/or recommendations related to products/solutions.
This document is not intended as a substitute for a detailed study or operational and
site-specific development or schematic plan. It is not to be used for determining
suitability or reliability of the products/solutions for specific user applications. It is the
duty of any such user to perform or have any professional expert of its choice
(integrator, specifier or the like) perform the appropriate and comprehensive risk
analysis, evaluation and testing of the products/solutions with respect to the relevant
specific application or use thereof.
The Schneider Electric brand and any trademarks of Schneider Electric SE and its
subsidiaries referred to in this document are the property of Schneider Electric SE or
its subsidiaries. All other brands may be trademarks of their respective owner.
This document and its content are protected under applicable copyright laws and
provided for informative use only. No part of this document may be reproduced or
transmitted in any form or by any means (electronic, mechanical, photocopying,
recording, or otherwise), for any purpose, without the prior written permission of
Schneider Electric.
Schneider Electric does not grant any right or license for commercial use of the
document or its content, except for a non-exclusive and personal license to consult it
on an "as is" basis.
Schneider Electric reserves the right to make changes or updates with respect to or in
the content of this document or the format thereof, at any time without notice.
To the extent permitted by applicable law, no responsibility or liability is
assumed by Schneider Electric and its subsidiaries for any errors or omissions
in the informational content of this document, as well as any non-intended use
or misuse of the content thereof.
Security Editor
Table of Contents
Safety Information.......................................................................................4
Before You Begin........................................................................................4
Start-up and Test ........................................................................................5
Operation and Adjustments .........................................................................6
About the Book ............................................................................................7
Security Editor Tool Implementation ...................................................... 11
Access Security Management ...................................................................12
Security Editor..........................................................................................16
Server .....................................................................................................17
User Information.......................................................................................19
User Functions .........................................................................................20
User Profiles ............................................................................................24
Policies....................................................................................................27
Login Policies...........................................................................................29
Certificate Actions.....................................................................................34
Certificate Whitelist ...................................................................................36
Client-Server Architecture for Security Editor ..............................................38
Configure a Controller for Use with EcoStruxure Control Expert Classic
Through the Enforced Engineering Link......................................................40
Syslog Events ..........................................................................................42
Recovery Procedure with a Detected Error .................................................43
EcoStruxure Control Expert Predefined Profiles .........................................44
EcoStruxure Control Expert and EcoStruxure Control Expert Classic
Access Rights ..........................................................................................46
EcoStruxure Control Expert and EcoStruxure Control Expert Classic
Access Rights Assigned to Predefined Profiles ...........................................52
OS Loader Access Rights .........................................................................59
Assigned OS Loader Access Rights to Predefined Profiles ..........................60
Security Database Migration Tool...............................................................61
Index ...........................................................................................................62
EIO0000004105.03 3
Security Editor Safety Information
Safety Information
Important Information
Read these instructions carefully, and look at the equipment to become familiar
with the device before trying to install, operate, service, or maintain it. The
following special messages may appear throughout this documentation or on the
equipment to warn of potential hazards or to call attention to information that
clarifies or simplifies a procedure.
The addition of this symbol to a “Danger” or “Warning” safety label indicates that an
electrical hazard exists which will result in personal injury if the instructions are not
followed.
This is the safety alert symbol. It is used to alert you to potential personal injury
hazards. Obey all safety messages that follow this symbol to avoid possible injury or
death.
! DANGER
DANGER indicates a hazardous situation which, if not avoided, will result in death or serious
injury.
! WARNING
WARNING indicates a hazardous situation which, if not avoided, could result in death or
serious injury.
! CAUTION
CAUTION indicates a hazardous situation which, if not avoided, could result in minor or
moderate injury.
NOTICE
NOTICE is used to address practices not related to physical injury.
Please Note
Electrical equipment should be installed, operated, serviced, and maintained only
by qualified personnel. No responsibility is assumed by Schneider Electric for any
consequences arising out of the use of this material.
A qualified person is one who has skills and knowledge related to the construction
and operation of electrical equipment and its installation, and has received safety
training to recognize and avoid the hazards involved.
4 EIO0000004105.03
Safety Information Security Editor
WARNING
UNGUARDED EQUIPMENT
• Do not use this software and related automation equipment on equipment
which does not have point-of-operation protection.
• Do not reach into machinery during operation.
Failure to follow these instructions can result in death, serious injury, or
equipment damage.
WARNING
EQUIPMENT OPERATION HAZARD
• Verify that all installation and set up procedures have been completed.
• Before operational tests are performed, remove all blocks or other temporary
holding means used for shipment from all component devices.
• Remove tools, meters, and debris from equipment.
Failure to follow these instructions can result in death, serious injury, or
equipment damage.
EIO0000004105.03 5
Security Editor Safety Information
Follow all start-up tests recommended in the equipment documentation. Store all
equipment documentation for future references.
Software testing must be done in both simulated and real environments.
Verify that the completed system is free from all short circuits and temporary
grounds that are not installed according to local regulations (according to the
National Electrical Code in the U.S.A, for instance). If high-potential voltage
testing is necessary, follow recommendations in equipment documentation to
prevent accidental equipment damage.
Before energizing equipment:
• Remove tools, meters, and debris from equipment.
• Close the equipment enclosure door.
• Remove all temporary grounds from incoming power lines.
• Perform all start-up tests recommended by the manufacturer.
6 EIO0000004105.03
About the Book Security Editor
Validity Note
This documentation is valid for EcoStruxure™ Control Expert 16.0.
For product compliance and environmental information (RoHS, REACH, PEP,
EOLI, etc.), go to www.se.com/ww/en/work/support/green-premium/.
Related Documents
Title of documentation Reference number
EcoStruxure™ Control Expert, Installation 35014792 (FRE)
Manual 35014793 (ENG)
35014794 (GER)
35014795 (SPA)
35014796 (ITA)
35012191 (CHS)
EIO0000004105.03 7
Security Editor About the Book
WARNING
LOSS OF CONTROL
• Perform a Failure Mode and Effects Analysis (FMEA), or equivalent risk
analysis, of your application, and apply preventive and detective controls
before implementation.
• Provide a fallback state for undesired control events or sequences.
• Provide separate or redundant control paths wherever required.
• Supply appropriate parameters, particularly for limits.
• Review the implications of transmission delays and take actions to mitigate
them.
• Review the implications of communication link interruptions and take actions
to mitigate them.
• Provide independent paths for control functions (for example, emergency
stop, over-limit conditions, and error conditions) according to your risk
assessment, and applicable codes and regulations.
• Apply local accident prevention and safety regulations and guidelines.1
• Test each implementation of a system for proper operation before placing it
into service.
Failure to follow these instructions can result in death, serious injury, or
equipment damage.
1For additional information, refer to NEMA ICS 1.1 (latest edition), Safety
Guidelines for the Application, Installation, and Maintenance of Solid State Control
and to NEMA ICS 7.1 (latest edition), Safety Standards for Construction and
Guide for Selection, Installation and Operation of Adjustable-Speed Drive
Systems or their equivalent governing your particular location.
WARNING
UNINTENDED EQUIPMENT OPERATION
• Only use software approved by Schneider Electric for use with this
equipment.
• Update your application program every time you change the physical
hardware configuration.
Failure to follow these instructions can result in death, serious injury, or
equipment damage.
WARNING
UNINTENDED EQUIPMENT OPERATION
Adapt examples given herein to the specific functions and requirements of your
industrial application before you implement them.
Failure to follow these instructions can result in death, serious injury, or
equipment damage.
Trademarks
Microsoft, Windows, Windows Server, and Windows Defender are either
registered trademarks or trademarks of Microsoft Corporation in the United States
and/or other countries.
8 EIO0000004105.03
About the Book Security Editor
EIO0000004105.03 9
Security Editor About the Book
Standard Description
ISO 12100:2010 Safety of machinery - General principles for design - Risk assessment and
risk reduction
EN 60204-1:2006 Safety of machinery - Electrical equipment of machines - Part 1: General
requirements
ISO 14119:2013 Safety of machinery - Interlocking devices associated with guards - Principles
for design and selection
Standard Description
IEC 61158 series Digital data communications for measurement and control – Fieldbus for use
in industrial control systems
Finally, the term zone of operation may be used in conjunction with the description
of specific hazards, and is defined as it is for a hazard zone or danger zone in the
Machinery Directive (2006/42/EC) and ISO 12100:2010.
NOTE: The aforementioned standards may or may not apply to the specific
products cited in the present documentation. For more information concerning
the individual standards applicable to the products described herein, see the
characteristics tables for those product references.
10 EIO0000004105.03
Security Editor Tool Implementation Security Editor
EIO0000004105.03 11
Security Editor Security Editor Tool Implementation
SecurityAdmin User
The SecurityAdmin username is reserved for the administrator of the Security
Editor tool.
NOTE: The SecurityAdmin user performs the administrative role that was
handled by the Supervisor (super user) in legacy versions of EcoStruxure
Control Expert (those that predate version 15.3).
After the EcoStruxure Control Expert software is installed on a workstation, only
the predefined SecurityAdmin user can launch the Security Editor and edit the
security configurations after the authentication.
The first time you launch the Security Editor tool, you are prompted to create a
password for the SecurityAdmin user:
Step Action
2 In the Username field on the sign-in screen, enter the SecurityAdmin username.
3 Change the SecurityAdmin password in the User Information tab, page 19.
12 EIO0000004105.03
Security Editor Tool Implementation Security Editor
The SecurityAdmin has a unique profile within the Security Editor. Only this user
has the administrative rights to manage the security database and define a list of
user names and their respective access rights to the software.
The SecurityAdmin can perform these tasks:
• Create or modify the user list.
• Create or modify user profiles.
• Disable one or more users.
• Modify the rules for software access security.
• Modify the SecurityAdmin password.
• Reset user passwords.
• Configure the authentication mechanism for a local or centralized database of
users and their associated access rights.
• Generate, use, and manage certificates and create a list of certificates for the
authentication of trusted computers.
User Profile
A user profile includes the defined access rights for a user. It is defined by a name,
an optional comment (maximum of 256 characters), and a list of access rights.
Security Editor provides 10 preconfigured profiles that cannot be modified. To
complete this list, the SecurityAdmin can create personalized profiles.
EIO0000004105.03 13
Security Editor Security Editor Tool Implementation
SecurityAdmin SecurityAdmin — —
Multiple Instancing
When EcoStruxure Control Expert executes multiple instances concurrently on the
same terminal, each instance grants access to the functions that were defined by
the rights of the user who created this instance.
14 EIO0000004105.03
Security Editor Tool Implementation Security Editor
EIO0000004105.03 15
Security Editor Security Editor Tool Implementation
Security Editor
Introduction
The Security Editor is used to define software users and their access rights. It also
allows you to define which actions are protected (by user name and password)
and stored in the log file.
Step Action
1 Open with Start > Programs > EcoStruxure Control Expert > Security Editor to see
the Enter user name and password dialog box.
NOTE: The dialog box has two text fields:
• Name
• Password
2 Enter your name and password in the appropriate fields and select OK.
3 If you are a SecurityAdmin user, page 12, you can access the User information screen,
page 19, where you can consult your user profile or modify your password.
16 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Server
Introduction
Use the configuration settings in the Server group box at the top of each Security
Editor tab to configure the local security service to run as a server that receives
authentication requests from other computers on the network. Those other
computers, therefore, function as clients in a client-server architecture.
NOTE: This guide includes a use-case example that shows the functionality of
Security Editor in a client-server relationship, page 38.
A user in the SecurityAdmin role can perform a Customized installation of
EcoStruxure Control Expert to install the Security Editor as a server in the
absence of a complete installation of EcoStruxure Control Expert (Classic or with
Topology Manager). For more information, refer to the EcoStruxure™ Control
Expert, Installation Manual.
Server Parameters
These are the configuration settings in the Server group box:
Parameter Description
In this case, Security Editor that runs on a client computer can target the
server computer using the Network protocol from the Centralized Protocol
menu on the Login Policies tab.
NOTE: The server requires a valid security service certificate to start. It
is therefore possible that a server does not run even when the
SecurityService as server parameter is selected. In this case, the
SecurityAdmin uses the instructions to generate a certificate on the
Certificate Actions tab, page 34.
Port nb Enter the port number that Security Editor uses to connect to a client
computer.
EIO0000004105.03 17
Security Editor Security Editor Tool Implementation
Restart Security Editor to implement the modified Port nb and Server State
parameters:
Step Action
2 Reopen the Security Editor tool to confirm that the server runs with the modified
parameters.
18 EIO0000004105.03
Security Editor Tool Implementation Security Editor
User Information
Introduction
This topic describes the parameters and functions that are available when you
select the User Information tab in the Security Editor tool.
All users can access this tab in order to consult their profiles and the associated
user rights. Only the SecurityAdmin user can modify the passwords.
Parameter Descriptions
The User Information tab indicates the name of the user and some
corresponding parameters.
Field Description
Name Select the name of the applicable user from this pull-down menu.
Status This read-only field displays one of these status for the active user:
• Expired: The password is expired.
• Valid until the <Expiration Date>: The password is active until the
displayed expiration date.
• Valid: The password is active without a time limit.
Profile(s) Product From this pull-down menu, select the product for which you want
to display the user profile.
Profile When you make a selection in the Name pull-down menu on this
tab, the name of the corresponding profile appears in this field.
View profile Select View profile to open the View profile dialog box, which
displays the access rights in the user profile.
NOTE: The Access rights list in this dialog box changes
to show the final access rights for users with multiple
profiles. These access rights are present when at least one
of the profiles in the multiple profiles contains that right.
If you are choosing to implement security, it is essential that you establish secure,
robust passwords for all users, whether you are enabling predefined users or
custom users.
WARNING
UNAUTHENTICATED ACCESS
Immediately define secure passwords upon adding or enabling new users.
Failure to follow these instructions can result in death, serious injury, or
equipment damage.
EIO0000004105.03 19
Security Editor Security Editor Tool Implementation
User Functions
Introduction
This topic describes the parameters and functions that are available when you
select the Users tab in the Security Editor tool.
Enable access to EcoStruxure Control Expert tools:
• EcoStruxure Control Expert with Topology Manager: Enable a user on the
Users tab to access EcoStruxure Control Expert with Topology Manager
regardless of the security level you selected on the Policies tab.
• EcoStruxure Control Expert Classic: Enable a user on the Users tab and
activate one of the security levels in the Policies tab to access EcoStruxure
Control Expert Classic.
NOTE: Refer to the selection of the security level in the Login group box
on the Policies tab, page 27.
Only the SecurityAdmin user can access the Users tab and enable the execution
of these functions:
• Modify the user list.
• Assign a profile to each user.
• Import and export information for one or more users.
• Disable one or more users.
• Delete passwords for one or more users.
20 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Parameter Descriptions
These parameters appear in the User(s) group box on the Users tab:
Element Description
(list) The list displays the users that are declared in the security database (including
Predefined users, page 14).
Add Select Add to add a new user to the User(s) list, page 22.
Delete Select Delete to delete the selected user(s) from the list.
NOTE: You cannot delete a predefined user.
Export(1) Select Export to save the database (name and profiles) for the selected user(s) to
a file.
• An exported file includes passwords.
• Refer to the description of database recovery, page 22.
Import Select Import to recover the database (name and profiles) of the selected user(s)
from a file.
NOTE: Refer to the description of database recovery, page 22.
Enable/ Toggle this button to switch between enabling and disabling access for a selected
Disable user:
• Enable: Press Enable to enable access for the user that is selected in the
User(s) list.
• Disable: Press Disable to disable access for the user or users that are
selected in the User(s) list.
NOTE:
◦ A disabled user is blocked at user authentication when security is
on, page 27. A disabled user that tries to start the software sees this
message: User disabled
◦ The name of a disabled user ends with the –disabled– suffix in the
list.
◦ You cannot disable a SecurityAdmin user.
Clear Select Clear Passwordto set the password value to an empty string.
Password
(1)The Security Editor runs under the SecurityAdmin user. It is not possible to access personal
folders for the user, such as the folders under C:\users\current_user_name. Attempts to
export a file to that location are therefore not successful.
EIO0000004105.03 21
Security Editor Security Editor Tool Implementation
These parameters appear in the Profile(s) group box on the Users tab:
Element Description
Product In this pull-down menu, select the product for which you want to define a user
profile.
Profile(s) A SecurityAdmin user can select the boxes of available options in this list to select
the profile or profiles to be associated with each selected user and mapped
product.
NOTE: Refer to the details below to associate profiles with Multiple Profiles,
page 22.
Add a User
Select Add to access these parameters:
Parameter Description
User name Enter the name of the new user in this field.
Password Enter a password for the new user in this field.
Confirm the password Reenter the password for the new user in this field.
With the following Select the attributes that correspond to the new user.
attributes
OK Select OK to save and implement the parameters of the new user.
NOTE: When you add a user on the Users tab, a corresponding profile
appears in the list of profiles on the Profiles tab, page 24. To view the
corresponding merged access controls, select the profile in the Profiles list on
the Profiles tab and select Edit.
Multiple Profiles
Only a SecurityAdmin user can associate multiple profiles with a single user for
each mapped product by selecting multiple items in the Profile(s) list.
This allows a user to log in with multiple profiles and products in the same or
different software contexts. The resulting profile is a fusion of the selected profiles.
You cannot modify the predefined users, products, and profiles that appear in the
Profile(s) list.
Database Recovery
You can export the security database (Users and Profiles) to create a backup file.
The SecurityAdmin can reset a lost or forgotten password if the database is saved
to a known location with the Export function before a file recovery is attempted
with the Import function.
NOTE: The Security Editor runs under the SecurityAdmin user. It is not
possible to access personal folders for the user, such as the folders under C:
\users\current_user_name. Attempts to export a file to that location are
therefore not successful.
22 EIO0000004105.03
Security Editor Tool Implementation Security Editor
EIO0000004105.03 23
Security Editor Security Editor Tool Implementation
User Profiles
Introduction
This topic describes the parameters and functions that are available when you
select the Profiles tab in the Security Editor tool.
Perform these functions on the Profiles tab:
• Add or delete a profile in the list.
• Read or modify the access rights associated with a profile.
• Import or export information for one or more user profiles.
Only the SecurityAdmin can access the Profiles tab.
Parameter Descriptions
These are the configurable parameters on the Profiles tab:
Component Description
Product — Select the product that corresponds to the user profile you want to
(pull-down access.
menu)
NOTE: This document applies to EcoStruxure Control Expert
(with Topology Manager) and EcoStruxure Control Expert
Classic. Therefore, only the Control Expert selection from this
menu is applicable to this guide.
Profiles (list) The user profiles in this list are associated with the selected product.
(group box)
Add Select Add to add a new user profile to the list.
NOTE: New user profiles appear in this list when you add a user
profile on the Users tab, page 24.
Delete Select Delete to delete one or more selected user profiles from the
list. If you delete a profile from the list, users with this profile have the
default profile.
NOTE: You cannot delete predefined user profiles from the list.
Edit Select Edit to modify the access rights associated with the selected
user profile and modify the user profile, page 22.
NOTE: You cannot modify predefined user profiles.
Export Export the information (name and profiles) of the selected user
(1)
profile(s) to a file by selecting Export.
Import Import the information (name and profiles) of the selected user
profile(s) from a file by selecting Import.
(1)The Security Editor runs under the SecurityAdmin user. It is not possible to access personal
folders for the user, such as the folders under C:\users\current_user_name. Attempts to
export a file to that location are therefore not successful.
Parameter Description
Add the profile Enter the name of the new user profile.
With the From this pull-down menu, select the user profile that has the access rights
following you want to attribute to the user profile.
OK Select OK to create the new profile and add it to the Profiles list.
24 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Parameter Description
Profile This file contains the name of the selected user profile.
Description Add comments are associated with the user profile (optional).
Column Description
Access right This column is a list of product access rights that are associated with the user
profile.
NOTE: Select or clear Display Safety rights to show or hide the access
rights for safety-related controllers in the list of access rights displayed for
EcoStruxure Control Expert. There are no access rights for safety-related
controllers for the loader management software or Security Editor.
Audit The storage of access rights to Windows Event Viewer log file is enabled (Yes)
or disabled (No) depending on the choice you make with the Audit Yes/No button
(below).
Parameter Description
EIO0000004105.03 25
Security Editor Security Editor Tool Implementation
Parameter Description
State On/Off Enable or disable a selected access right for the selected profile:
1. Select an item in the Access right column.
2. Select State On/Off to toggle the selection mark for the selected item.
Audit Yes/No Change the value in the Audit column from No to Yes to enable the selected
Access right for storage in the log file:
1. Select an item in the Access right column.
2. Select Audit Yes/No to change the value from No to Yes or vice-versa.
Confirm Yes/No Change the value in the Confirm column from No to Yes to require
confirmation for an operation:
1. Select an item in the Access right column.
2. Select Confirm Yes/No to change the value from No to Yes or vice-
versa.
OK Apply the changes you made.
26 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Policies
Introduction
This topic describes the parameters and functions that are available when you
select the Policies tab in the Security Editor tool.
Only the SecurityAdmin can configure the parameters on the Policies tab to
execute these functions:
• Determine the guidelines that are associated with a product.
• Define the default profile.
• Enable or disable the Audit option.
• Enable or disable the Confirm option.
• Configure the duration (in days) of the password validity.
The following tables describe the parameters on the Policies tab.
Product Selection
Product Select Control Expert from this pull-down menu.
NOTE: This document describes the Security Editor with respect to
EcoStruxure Control Expert (with Topology Manager) and EcoStruxure Control
Expert Classic. Therefore, only the Control Expert selection from this menu is
applicable to the information in this guide.
Login Parameters
Use these selections in the Login group box to define security access rules for
users:
Security off Select this radial button to disable security and retain complete access to the
product.
Security on, Select this radial button to enable security and require both the user name
mandatory login and password. The defined profile for that user name is enforced.
Security on, Select this radial button to enable security. If you do not enter your user name
avoidable login and password, you can access the product, but confined to the default user
profile defined by the Fixed profile selection. If you also enter your user
name and password, you can access the product with the profile associated
with your user name.
Security on, no Select this radial button to allow access directly to the product without a
login prompt for user name and password. However, security is enabled in the
sense that you are confined to the default profile defined by the Fixed profile
selection.
Fixed profile Use this pull-down menu to select a default user profile.
EIO0000004105.03 27
Security Editor Security Editor Tool Implementation
Audit Select this checkbox to create a log file that stores user events for EcoStruxure Control
Expert and loader management software.
NOTE: View the log file with standard Windows commands (Start > Programs >
Windows Administrative Tools > Event Viewer.)
Confirm When you select this checkbox, enter your name and password each time you define
secure access for a user action, page 24.
NOTE: If you select Confirm, carefully select access rights when you create a new
profile. Otherwise, actions will require multiple confirmations.
NOTE:
• The Audit and Confirm options are not assigned to a single user. They apply globally to
users that have authorized access to the product.
• When you disable security with the Security off option, the functionalities of the Audit
and Confirm checkboxes are unavailable.
Password Select this checkbox to reject login attempts that use an expired password (as
validity period defined by the Period in days value and the age in days of the latest
password).
NOTE:
• You can implement the Password validity period only when you
select Security on, mandatory login from the Login group box.
• When the Password validity period checbox is not selected, the
password does not expire. The value in the Period in days field is
therefore ignored.
Period in days Enter the number of days for which the password is valid when you select
Password validity.
Apply Select Apply to save and implement the value in the Period in days field.
NOTE: After you define a validity period for at least one user, you can verify
the validity period. Select the user in the Name field on the User information
tab and read the information associated with the Status field.
28 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Login Policies
Introduction
This topic describes the parameters and functions that are available on the Login
Policies tab in the Security Editor.
Use this tab to configure the authentication mechanism for a local or centralized
database of users and their associated access rights.
These database types are available in the Authentication Mode pull-down menu:
• local: For a local database, the computer accesses a local database. In this
case, select the Local database.
• centralized: For centralized databases, a client computer accesses a remote
computer to use its database by selecting one of several centralized
database types.
NOTE: This guide includes a use-case example that shows the use of
Security Editor in a client-server relationship, page 38.
Local Database
On the Login Policies tab, choose Local from the Authentication Mode pull-
down menu to configure an authentication database in the local computer.
Use the Local mode to define users and their corresponding Role Based Access
Control (RBAC) settings in the Security Editor database on the same local
computer that is used for authentication.
When you select (and apply) a local database, you can change and update the
login behavior on the Policies tab, page 27.
NOTE: The functionality with a local database matches the functionality of the
authentication mode in legacy releases of the tool that predate EcoStruxure
Control Expert version 15.3.
EIO0000004105.03 29
Security Editor Security Editor Tool Implementation
Centralized Database
On the Login Policies tab, choose one of these Centralized options from the
Authentication Mode pull-down menu to configure a database on a remote
server to authenticate one or more EcoStruxure Control Expert clients:
Authentication Description
Mode
Centralized,Local An attempt is made to authenticate users against a remote centralized
database. If that attempt is not successful, a subsequent attempt is made
to authenticate users against a local database.
NOTE: The Authentication Mode options that include a comma indicate the sequence of
attempts to access a server. For example, the Centralized,Local option attempts to access a
centralized server first and a local server second.
30 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Parameter Descriptions
This table describes the remaining parameters for the Network Security Service
group box on the Login Policies tab:
Parameter Description
Centralized Network Register the authentication for a server that is not on the same local computer that
Protocol(1) makes the authentication request. This authentication allows local computers to use the
(pull-down menu) centralized configuration of a remote server on which Security Editor is installed.
LDAP Implement the Lightweight Directory Access Protocol (LDAP) for user authentication
through an LDAP server.
NOTE:
• The LDAP protocol is available in the Centralized Protocol menu only when
you select a Centralized option from the Authentication Mode menu.
• When EcoStruxure Control Expert connects to a remote server, the
implemented security database is always that of the server. The selections in
the Authentication Mode and Centralized Protocol pull-down menus on the
Login Policies tab are therefore ignored except when LDAP is selected from
the Centralized Protocol menu.
Server Address(1) Host IP Enter the IP address of the remote server to be used for authentication.
Host Name/DNS Enter a name for remote server to be used for authentication.
Port Enter the port number of the remote server to be configured for security authentication.
By default, these port numbers are associated with the selected protocol:
• 50051: Network is selected in the Centralized Protocol menu.
• 389: LDAP is selected in the Centralized Protocol menu.
LDAP Protocol LDAP Group(s)(3) Configure LDAP groups manually to authenticate the users in these LDAP groups.
Details(2)
Profile(s)(3,4) — Select the profiles in this list to associate them with the selected group(s).
Base DN(2) — When active, this field contains the distinguished name that is created from the path to
the user.
NOTE: Refer to the description of Base DN below.
Import — Import the information (Login Policies) from a file by selecting Import.
Base DN
The Base DN field is active when LDAP is selected in the Centralized Protocol
menu.
In a non-Windows LDAP server, the Base DN field is mandatory and it can be
provided by the server administrator. The Base DN contains the location at which
you can find the user to be authenticated.
EIO0000004105.03 31
Security Editor Security Editor Tool Implementation
You can enter the CN (common name) or UID (user identifier) to log in to the
software. In this case, the path to the user in the Base DN field is used to create a
DN (distinguished name) for the logged-in user.
32 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Step Action
4 Select a group from the LDAP group(s) pull-down menu and select names of profiles in
the Profile(s) list to be associated with that group.
NOTE: Repeat this step to associate profiles with all items in the LDAP group(s)
pull-down menu.
EIO0000004105.03 33
Security Editor Security Editor Tool Implementation
Certificate Actions
About EcoStruxure Control Expert Certificates
This topic describes the parameters and functions that are available in the
Certificate Actions tab in the Security Editor tool. Access this tab to generate and
share EcoStruxure Control Expert certificates. In a client/server relationship, these
certificates are added to the Certificate whitelist, page 36 to enforce security
among the exchanges.
Create certificates:
• automatically: The security-service and EcoStruxure Control Expert
certificates are generated automatically when you launch Security Editor for
the first time.
• manually: Create a self-signed certificate in the Certificate Actions tab. The
parameters for this tab are described below.
NOTE: This guide includes a use-case example that shows the functionality of
Security Editor in a client-server relationship, page 38.
Parameter Descriptions
The parameters and GUI features on the Certificate Actions tab are applied to
the manual creation of certificates:
Parameter Description
Product This document describes the Security Editor with respect to EcoStruxure
(pull-down menu) Control Expert (with Topology Manager) and EcoStruxure Control Expert
Classic.
General Self Signed Select General Self Signed Certificateto generate a self-signed
Certificate certificate for products that require secure communications.
(button)
Export Certificate Select Export Certificateto export an existing certificate that is saved
(button) locally.
NOTE: You can export a certificate only after you generate a
certificate for a selection in the Product pull-down menu and select
General Self Signed Certificate.
Step Action
1 On the designated server computer, select the Certificate Actions tab, page 34.
3 Select Generate Self Signed Certificate to generate and install the EcoStruxure
Control Expert or security service certificates in the local Windows certificate store.
34 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Step Action
5 Optional: Hover the cursor over the icon to verify that the self-signed certificate was
generated and saved to the certificate store.
Export a Certificate
From within the Security Editor, you can use one of these tools to export the
certificate that you generated above:
• Export Certificate (in Security Editor)
• Certificate Export Wizard: (Windows tool)
Both procedures are described below.
Export Certificate:
Use Export Certificate to export a generated certificate from the local Windows
certificate store:
Step Action
2 Use standard Windows commands to drive to a location and save the certificate.
Step Action
1 Select Certificate Properties to open the Windows Certificate properties dialog box.
5 Select the No .... radial button, and select Next to go to the Export File Format page.
NOTE: The Security Editor uses a TPM (Trusted Platform Module) to generate and
store private keys and therefore cannot export the private key with the certificate. If
you try to export the key (Yes, export the private key), the export procedure errors
on the last wizard page.
6 Select a file format radio button, and select Next to go to the File to Export page.
8 Select Next to go to the completion page and select Finish to complete the export.
NOTE: The Certificate Properties in the Security Editor tool opens the same
Certificate (properties) dialog box for Windows that you open when you
double-click a certificate in the Microsoft Management Console. Similarly, the
Copy to File in the Security Editor tool opens the same Certificate Export
Wizard for Windows that you open when you right-click a certificate in the
Microsoft Management Console and scroll to All Tasks > Export.
EIO0000004105.03 35
Security Editor Security Editor Tool Implementation
Certificate Whitelist
Introduction
The Certificate whitelist tab in Security Editor displays a list of connections to
remote servers that are trusted by personnel in the SecurityAdmin role.
Use the parameters on this tab to add trusted servers to the table.
NOTE:
• The use of bypass firewalls may be required to create a successful
connection to the remote IP port of the server.
• This guide includes a use-case example that shows the functionality of
Security Editor in a client-server relationship, page 38.
Step Action
1 Open the Set Address dialog box in EcoStruxure Control Expert (PLC > Set Address)
and make these selections in the PLC group box:
• Address: SYS
• Communication Protocol: HTTPS via USB
Select OK to close the dialog box.
4 Select Transfer Project from PLC and monitor the progress bar in the Project transfer
pop-up window.
5 Open the PLCScreen window (Tools > PLC Screen) and select the Information tab to
that the NETWORK ADDRESS is a USB connection.
6 SelectDisconnect.
7 Launch the Security Editor and select the Certificate whitelist tab.
To open the Certificate dialog box and view the properties and status of the
certificate on the Details tab, select ellipses (...) from any row in the whitelist.
Step Action
1 On the Certificate whitelist tab, select Add to open the Add Server Address dialog box.
36 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Step Action
3 Enter a port number (Port) that supports traffic from the server.
4 Select the plus sign (+) to view the connection in the table and reset the IP address to
0.0.0.0.
NOTE: Select the plus sign (+) to add multiple connections to the Add Server
Address table.
5 Select OK to confirm that the new connection appears in the list of trusted remote servers
and close the Add Server Address dialog box.
NOTE:
• Repeat the above steps to create additional connections
• When EcoStruxure Control Expert connects to a remote server, the
implemented security database is always that of the server. The selections in
the Authentication Mode and Centralized Protocol pull-down menus on the
Login Policies tab are therefore ignored, except when LDAP is selected from
the Centralized Protocol menu.
6 Select the appropriate checkboxes for the new connections and slect Trust Certificates
to add the certificates to the security database and complete the whitelisting operation.
Management Buttons
Select these buttons in the Connections group box to manage items in the
whitelist:
• Add: Open the Add Server Address dialog box.
• Select All: Select all items before you remove them from the table or to
confirm their trusted status with Trust Certificate.
• Unselect All: Deselect all items in the table.
• Remove: Remove the selected item or items from the whitelist table.
Once the certificate is obtained, the status of each connection is automatically
updated.
EIO0000004105.03 37
Security Editor Security Editor Tool Implementation
Step Action
1 Launch Security Editor to view the Server group box (at the top of every Security Editor
tab).
2 Confirm that the certificate for the selected product is valid by hovering the mouse over
the certificate icon on the Certificate Actions tab, page 34.
38 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Step Action
5 In the Port field, enter the port number of the server computer.
6 Select Apply.
EIO0000004105.03 39
Security Editor Security Editor Tool Implementation
Step Action
1 In EcoStruxure Control Expert Classic, create a new project (File > New) to open the
New Project dialog box.
2 Select a controller for the application and click OK to open the Security enforcement
dialog box.
3 When prompted, create a new Application password for the project and click OK to
close the Security enforcement dialog box.
4 In the PLC bus, double-click the ports on the controller to open the submodule
parameters.
5 Select the Security tab and click the Unlock Security button to enable all services.
a. Open the Set Address dialog box (PLC > Set Address).
b. Select MODBUS TCP from the Communication Protocol pull-down menu.
8 Rebuild the project (Build > Rebuild All Project) and save the application (File >
Save).
9 Download the project to the controller (PLC > Transfer Project to PLC).
When you open the EcoStruxure Control Expert Classic project in the future, you
are prompted for the application password.
Change the Password: Change the password for a project or add a password to
an existing (password-less) project:
Step Action
2 In the Project Browser, right-click Project and select Properties to open the
Properties of Project dialog box.
3 Select the Projects & Controller Protection tab and click the Change password...
button to open the Modify Password dialog box for the applicable password
(Application, Firmware, Web Diagnostic/Data Storage).
40 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Step Action
NOTE: To change the password for a password-protected application, first enter the
existing password in the Old password field.
5 Rebuild the project (Build > Rebuild All Project) and save the application (File >
Save).
6 Click OK to apply the new passwords and close the Modify Password dialog box.
Step Action
1 Using the Security Editor that runs on a local computer, select the Certificate Actions
tab, page 34..
2 Select SecurityService (or Control Expert) from the Product pull-down menu.
NOTE: The certificates are generated at the first launch of the Security Editor.
If necessary, you can manually generate a certificate. (Refer to the instruction
to generate a certificate on the Certificate Actions tab, page 34.
EIO0000004105.03 41
Security Editor Security Editor Tool Implementation
Syslog Events
Enable Tracking
Perform these tasks in the Security Editor tool to enable the Syslog service to
track Syslog events in the Syslog server:
Tab Task
Profiles Create a new profile with the applicable audit cases.
Select the Audit checkbox to implement the audit for the new profiles you
want to monitor.
42 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Configuration Access
Access is configured with an avoidable login The undefined user can access EcoStruxure
(Security On, Password Optional). Control Expert or the loader management
software with the default profile.
Access is configured with a mandatory login The undefined user cannot access EcoStruxure
(Security On, Password Required). Control Expert or the loader management
software.
For Security Editor, access is set to a mandatory login (Security On, Password
Required) and cannot be modified. An undefined user cannot access Security
Editor.
NOTE: If the database of the Security Editor is corrupted or it was deleted,
access to EcoStruxure Control Expert or the loader management software is
not possible, even if security is not active (Security Off).
Installation Results
Type
Upgrade Moves the security database files to a backup folder to facilitate a later migration of
the database.
Removes all other security components.
NOTE: The security components are created the first time you launch the
Security Editor.
EIO0000004105.03 43
Security Editor Security Editor Tool Implementation
ReadOnly Program The user can only access the project in read mode, except for the controller
address, which can be modified. The user can also copy or download the project.
Program-PROCESS
Program-SAFE
Operate Program The user has the same rights as with a ReadOnly profile, with the added
possibility of modifying execution parameters (constants, initial values, task cycle
Program-PROCESS times, etc.).
Safety_Operate Program The user has similar rights as with the Operate profile, but with respect to the
safety-related program, except that:
Program-PROCESS
• Transferring data values to the non-safety-related controller is not
permitted.
Program-SAFE
• Commanding the safety-related program to enter maintenance mode is
permitted.
Adjust Program The user has the same rights as with an Operate profile, with the added
possibility of uploading a project (transfer to the controller) and modifying the
Program-PROCESS controller operating mode (Run, Stop, ...).
Safety_Adjust Program The user has similar rights as with the Adjust profile, but with respect to the
safety-related program, except that:
Program-PROCESS
• Transferring data values to the non-safety-related controller is not
permitted.
Program-SAFE
• Commanding the safety-related program to enter maintenance mode is
permitted.
Debug Program The user has the same rights as with an Adjust profile, with the added possibility
of using the debugging tools.
Program-PROCESS
Safety_Debug Program The user has similar rights as with the Debug profile with respect to the safety-
related program, with these exceptions:
Program-PROCESS
• Stopping or starting the program is not permitted.
Program-SAFE • Updating initialization values is not permitted.
• Transferring data values to the non-safety-related controller is not
permitted.
• Forcing inputs, outputs or internal bits is not permitted.
• Commanding the safety-related program to enter maintenance mode is
permitted.
Program Program The user has the same rights as with a Debug profile, with the added possibility
of modifying the program.
Program-PROCESS
Safety_Program Program The user has similar rights as with the Program profile, but with respect to the
safety-related program, except that:
Program-PROCESS
• Stopping or starting the program is not permitted.
Program-SAFE • Updating initialization values is not permitted.
• Transferring data values to the non-safety-related controller is not
permitted.
• Forcing inputs, outputs or internal bits is not permitted.
• Commanding the safety-related program to enter maintenance mode is
permitted.
44 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Predefined DTM roles (access rights to modify DTMs) are associated with the
user profiles. Preconfigured user profiles are associated with specific DTM roles,
and a new user profile is associated with a selected DTM role. This table shows
the correspondence between profile names and DTM roles:
Adjust SystemOperator
Debug MaintenanceEngi-
neer
Operate SystemOperator
Program PlanningEngineer
ReadOnly SystemObserver
Safety_Adjust SystemOperator
Safety_Debug MaintenanceEngi-
neer
Safety_Operate SystemOperator
Safety_Program PlanningEngineer
NOTE:
• Refer to the directions for creating a new user profile, page 24.
• When you map a DTM role to a user profile, choose the role that best
corresponds to the access rights for that profile.
EIO0000004105.03 45
Security Editor Security Editor Tool Implementation
Topology Manager
These are the minimum access rights that are required to execute a command in
EcoStruxure Control Expert when security is on:
Commands and actions related to the system project.
Actions that modify the state or content of a system Modify system project
project or the value of an attribute of an object in a
system project.
Actions related to physical views, such as, creating, Modify system project
modifying, or deleting physical views, changing
assignments or position of devices, links between
devices.
Actions related to logical networks, such as, Modify system project
creating, modifying, or deleting networks, changing
network assignments or IP address assignments of
devices.
Define Password or Clear Password (system Manage system project settings
project Password and Webuser Password)
46 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Project Services
These access rights apply to project services:
EIO0000004105.03 47
Security Editor Security Editor Tool Implementation
SaveAs a project Save the project with a new name or to a new location.
Build on-line STOP Launch a generation of the executable in online mode when the controllers are de-energized.
Build on-line RUN Launch a generation of the executable in online mode when the controllers energized.
Start, stop or initialize the PLC Command the controller to energize, de-energize, or initialize.
NOTE: Only process tasks are started or stopped:
• For a non-safety-related controller, controller starts or stops.
• For an M580 safety controller, tasks other than the SAFE task start or stop.
Update init values with current Update the initial values with the latest values (only non-safety-related data).
values
Transfer project from PLC Transfer the executable program from the controller to the terminal.
Transfer project to PLC Transfer the executable program from the terminal to the controller.
Transfer data values from file to Transfer data from a file to the controller (non-safety-related data only).
PLC
Restore project backup in PLC Restore the contents of backup memory (Premium) or the memory card (Modicon M340 and
Modicon M580) in the controller executable area.
NOTE: On Modicon M580, you can save to flash memory if no memory card is inserted.
Save to project backup in PLC Save the project program in the backup memory (Premium) or the memory card (Modicon M340
and Modicon M580).
NOTE: On Modicon M580, restore from flash memory if no memory card is inserted.
Adjustment/Debugging
These access rights apply to adjustments and debugging:
Modify variable values Modify the value of the variables (non-safety-related variables only).
Modify safety variable values Modify the value of the safety-related variables.
Task management Command the execution of project program tasks (energize, de-energize; initialization).
SAFE Task management Command the execution of safety project program SAFE tasks (energize, de-energize,
initialization).
Task cycle time modification Modify cycle times for cyclical tasks.
SAFE Task cycle time modification Modify cycle times for cyclical SAFE tasks.
Replace a project variable Replace all occurrences of a variable in the program with another variable (non-safety-
related variables only).
Replace a safety project variable Replace all occurrences of a safety-related variable in the program with another.
48 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Libraries
These access rights apply to libraries:
Delete an object from safety library Delete an object from a safety-related library.
Get an object from a library Import an object from a library to the project.
Get an object from the safety library Import an object from a safety-related library to the project.
Global Modification
These access rights apply to global modifications:
Modify the animation tables Modify the structure (not the values) of animation tables.
Modify safety constants value Modify the value of the safety project constants.
Modify the program structure Modify the executable code structure (add/delete a section; modify the activation conditions for a
section; modify section order.)
Modify the safety program Modify the safety executable code structure (add/delete a section; modify the activation conditions
structure for a section; modify section order.)
Modify safety program sections Modify the executable code for a section in the safety program.
Variable main attributes modifications Modify a variable's name, type, and address.
Safety Variables main attributes modifications Modify a safety-related variable's name, type, and address.
Variable minor attributes modifications Modify the comment and the initial value for a variable.
Safety Variables minor attributes modifications Modify the comment and the initial value for a safety-related variable.
EIO0000004105.03 49
Security Editor Security Editor Tool Implementation
DDT modifications Modify the structure, comment, and initial value of a compound data item.
Safety DDT modifications Modify the structure, comment, and initial value of a safety compound data item.
Safety DFB type structure modification Modify the structure of a safety DFB type.
DFB type sections modification Modify the code section of a DFB type.
Safety DFB type sections modification Modify the code section of a safety DFB type.
DFB type instance modification Add, delete, or modify (name and type) a DFB instance.
Safety DFB type instance modification Add, delete, or modify (name and type) a safety DFB instance.
DFB type instance minor attributes modification Modify the comment and the initial value for a DFB instance.
Safety DFB type instance minor attributes modification Modify the comment and the initial value for a safety DFB instance.
50 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Modify the safety I/O configuration Modify the safety input/output configuration.
Save_param Save the module input/output parameters explicitly. (The initial parameter
values are replaced by the latest values).
Runtime Screens
These access rights apply to runtime screens:
Cyber Security
These access rights apply to cyber security:
Create or modify application password Create and modify the application password.
EIO0000004105.03 51
Security Editor Security Editor Tool Implementation
Topology Manager
Safety_Program
Safety_Operate
Safety_Adjust
Safety_Debug
ReadOnly
Program
Operate
Adjust
Debug
Access right
✔ Included
– not included
52 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Project Services
Safety_Program
Safety_Operate
Safety_Adjust
Safety_Debug
ReadOnly
Program
Operate
Adjust
Debug
Access right
Save a project – – – – – – – ✔ ✔
SaveAs a project ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔
Import a project – – – – – – – ✔ ✔
Build off-line – – – – – – – ✔ ✔
Set address ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔
Modify options – ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔
✔ Included
– not included
EIO0000004105.03 53
Security Editor Security Editor Tool Implementation
Adjustment/Debugging
Safety_Program
Safety_Operate
Safety_Adjust
Safety_Debug
ReadOnly
Program
Operate
Adjust
Debug
Access right
Force outputs – – – ✔ – – – ✔ ✔
Force inputs – – – ✔ – – – ✔ ✔
Task management – – – ✔ – – – ✔ ✔
✔ Included
– not included
Libraries
The access rights for this category are as follows:
Safety_Program
Safety_Operate
Safety_Adjust
Safety_Debug
ReadOnly
Program
Operate
Adjust
Debug
Access right
✔ Included
– not included
54 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Global Modification
The access rights for this category are as follows:
Safety_Program
Safety_Operate
Safety_Adjust
Safety_Debug
ReadOnly
Program
Operate
Adjust
Debug
Access right
✔ Included
– not included
Safety_Program
Safety_Operate
Safety_Adjust
Safety_Debug
ReadOnly
Program
Operate
Adjust
Debug
Access right
Variable add/remove – – – – – – – ✔ ✔
✔ Included
– not included
EIO0000004105.03 55
Security Editor Security Editor Tool Implementation
Safety_Program
Safety_Operate
Safety_Adjust
Safety_Debug
ReadOnly
Program
Operate
Adjust
Debug
Access right
DDT add/remove – – – – – – – ✔ ✔
DDT modifications – – – – – – – ✔ ✔
✔ Included
– not included
Safety_Program
Safety_Operate
Safety_Adjust
Safety_Debug
ReadOnly
Program
Operate
Adjust
Debug
Access right
✔ Included
– not included
Safety_Debug
ReadOnly
Program
Operate
Adjust
Debug
Access right
– not included
56 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Safety_Program
Safety_Operate
Safety_Adjust
Safety_Debug
ReadOnly
Program
Operate
Adjust
Debug
Access right
I/O sniffing – – – – – – – ✔ ✔
✔ Included
– not included
Safety_Program
Safety_Operate
Safety_Adjust
Safety_Debug
ReadOnly
Program
Operate
Adjust
Debug
Access right
Save_param – – – ✔ – – – ✔ ✔
Restore_param – – – ✔ – – – ✔ ✔
✔ Included
– not included
Runtime Screens
The access rights for this category are as follows:
Safety_Program
Safety_Operate
Safety_Adjust
Safety_Debug
ReadOnly
Program
Operate
Adjust
Debug
Access right
Modify screens – – – – – – – ✔ ✔
Modify messages – – – – – – – ✔ ✔
✔ Included
– not included
EIO0000004105.03 57
Security Editor Security Editor Tool Implementation
Cyber Security
The access rights for this category are as follows:
Safety_Program
Safety_Operate
Safety_Adjust
Safety_Debug
ReadOnly
Program
Operate
Adjust
Debug
Access right
✔ Included
– not included
58 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Description
The OS Loader access rights are as follows:
EIO0000004105.03 59
Security Editor Security Editor Tool Implementation
Project services
Access right ReadOnly Program
Connect/disconnect ✔ Yes No ✔ No No
Read Device Properties ✔ Yes No ✔ No No
Start/Stop – Yes No ✔ No No
– not included
60 EIO0000004105.03
Security Editor Tool Implementation Security Editor
Step Action
2 When prompted, log in to the previous database by entering the access credentials for
the SecurityAdmin account, page 12 on the Security Database Migration Tool login
page.
NOTE: In legacy versions of EcoStruxure Control Expert (earlier than version 15.3),
use the credentials for the Supervisor (super user) account, as discussed in the
description of the migration of the administrator role.
3 Select Login and accept any prompt to log in to the current database.
4 Enter the access credentials for the same administrative user as above on the Security
Database Migration Tool login page.
5 Select Login and wait for confirmation that the previous data are migrated to the current
database.
NOTE: You can confirm that the database is migrated by verifying that the
appropriate data appears on the tabs in the Security Editor.
EIO0000004105.03 61
Security Editor
Index
C
Control Expert
access rights .....................................................46
predefined profiles .............................................52
Security Editor ...................................................46
O
OS Loader
access rights .....................................................59
security editor ....................................................59
OS Loader
predefined user profiles ......................................60
62 EIO0000004105.03
Schneider Electric
35 rue Joseph Monier
92500 Rueil Malmaison
France
+ 33 (0) 1 41 29 70 00
www.se.com