4 - getting started / using the security levels, Chapter objectives, Some questions and answers about system security – Rockwell Automation 5370-UPK CVIM USER-PAK Option User Manual

Page 19: Getting started / using the security levels

Advertising
background image

A–B

4

Chapter

4–1

Getting Started / Using the Security Levels

Contents

Chapter Objectives

4–1

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Some Questions and Answers about System Security

4–1

. . . . . . . . . . . . .

Accessing the Setup Mode

4–2

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Security Levels

4–3

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Changing Passwords

4–5

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Setting Security ON/OFF

4–8

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Lost Passwords – Using the Installation/Key Card

4–8

. . . . . . . . . . . . . . . .

This chapter describes:

How to enter the setup mode with the USER–PAK option installed.

Each of the security levels.

How to change passwords.

How to enter setup mode using the Installation / Key Card.

This section introduces security by posing some questions and answers.

What type of system security does USER–PAK provide?
With the USER–PAK option installed, access to the setup mode requires a
password (unless security is turned OFF – see Setting Security ON/OFF in
this chapter). The password requirement can help provide assurance against
unauthorized modification of the CVIM configuration, and help prevent
unauthorized personnel from taking the CVIM module out of run mode.

What are “security levels?”
The USER–PAK system security enables access to four different levels of
interaction; we refer to these different levels as “security levels.”

Three security levels are defined within the setup mode, each allowing a
different level of interaction with CVIM / USER–PAK features:

ADMINISTRATOR – Full access to CVIM / USER–PAK features.

MANAGER – Mid–level access to CVIM / USER–PAK features.

USER – Lower–level access to CVIM / USER–PAK features.

Access to CVIM runtime menus and displays does not require a password –
this “runtime” level of interaction can be considered as a fourth level of
security.

Why have different security levels available?
The different security levels allow for implementation of a hierarchical
system of access to and responsibility for the CVIM module setup. For

Chapter Objectives

Some Questions and
Answers about System
Security

Advertising