Rockwell Automation Logix5000 Controllers Security Programming Manual User Manual

Page 35

Advertising
background image

Configuring source protection in the Logix Designer application Chapter 4

Use descriptive names to help identify the purpose of the source. For instance, a

source key used to secure components that field engineers require access might be

named, Field Engineer.

Important:

If the same source keys will be used with version 18 and earlier and

version 19 and later of the application, begin each source key with a
lowercase character a-z, or an underscore character ( _ ), and use only
characters lowercase a-z, 0-9 , or an underscore character ( _ ) within the
source keys.
If you use source key names in version 19 and later of the application, and
your source keys are IEC61131-3 compliant, your source keys will still work
in version 18 and earlier.

Follow these steps to apply a source key to one or more components.

1. Open an offline project file.

2. On the menu bar, click Tools, then click Security, and then click

Configure Source Protection.

3. In the Source Protection Configuration dialog box, select one or more

components that require protection and click Protect.

Rockwell Automation Publication 1756-PM016G-EN-P - October 2014

35

Advertising