13 security, 1 security levels – MoTeC M1 Tune User Manual User Manual

Page 65

Advertising
background image

User Manual

SECURITY

Printed documents are not controlled

Page 64

13

SECURITY

The MoTeC M1 system provides an advanced security system based on public-private key
cryptography. This security method means that once an ECU has been correctly configured with
appropriate security settings, it is practically impossible to access the ECU without the correct
key or password.

Starting with this advanced method of security, an extremely flexible and comprehensive
security system has been added to the M1 software. There are currently three security levels in
the M1.

13.1

SECURITY LEVELS

The M1 Build software has the controls to configure the appropriate security settings for an M1
project. Security levels define the type of security used. Each level is defined below.

Off

When security is turned off, there is no security available throughout the M1 system. There is no
option to configure users or security in either M1 Build or M1 Tune. Anyone who connects to the
M1 ECU will be able to logon, download, modify or view any objects in the Package.

Basic

Basic security allows for a security setup that is easy to implement and maintain, but doesn't
have the flexibility of the advanced security.

There are no configuration settings in build for the basic security method, it also has no security
groups and no build users.

With basic security, all configurations are done in the M1 Tune application. When M1 Tune is
first started with Basic security, the security system is effectively turned off. M1 Tune configures
only a Guest user at this time, which has no password, and has full access to the system. The
Guest account is a permanent account that is always available with Basic security. However, by

adding a new user, you can set the Guest account to have no privileges. Doing this will
effectively cause the Guest account to have no access, and administrator rights will pass to your
new user. Your new user can have either password or key authentication for additional security.
There must always be one user who has administrator access, and the administrator has access

to everything. There can be more than one administrator. Other users can have varying levels of
access, options for security include:

• Allow send firmware

• Allow change password

• Allow change workbooks

• Allow change ECU name

• Allow firmware send, or upgrade only

• View, adjust or no access to the default security group

• Configurable access to Adjust, View, Retrieval, Convert and Erase of the 8 log systems.

Advertising