Security is implemented as a small integer in each of the securable operator input objects of the controllers. Each bit of the 8-bit integer represents a different security group which is then associated with a FTView security code with a value of 0 being no access (or Read Only).
|Security Group1||FTView Security
1Security Group names are configured in S88 Builder Studio.
2FTView Security Codes are assigned and configured in FTView Studio.
A security value of 0 would be read only and a value of -1 would be unsecured access.
To simplify configuration in S88 Builder each Security Group will be configurable into a Security Role. There is an unlimited number of roles that may be configured but with only 8 bits you are limited to 40321 possible combinations, or 721 for the example shown above.
|Security Role||ID||Security Groups|
|Any||0||Operator, Manager, Maintenance, Engineer, Supervisor, Administrator|
|Controls||1||Operator, Manager, Maintenance, Engineer, Supervisor, Administrator|
|Abort||2||Manager, Maintenance, Engineer, Supervisor, Administrator|
|Setpoints||3||Manager, Maintenance, Engineer, Supervisor, Administrator|
|Statics Reset||4||Manager, Maintenance, Engineer, Supervisor, Administrator|
|Clear AC||5||Operator, Manager, Maintenance, Engineer, Supervisor, Administrator|
|Manual||6||Maintenance, Engineer, Supervisor, Administrator|
This table is downloaded to both the PRC and EQC as a boolean integer of the Security Groups they contain.
|EM Clear Failures||Clear AC|
|EM CP 1||ReadOnly|
|EM CP 2…||Setpoints|
Each Secure object will be download with a numeric pointer back to the Security Role. When the object is shared with the HMI the object’s role will be replaced by its actual binary representation of the groups.
Where to download securable setting for each securable: If downloaded into dynamic array that is consolidated. It could replace the Securable selection with its SINT representation in the consolidated area. But things that aren’t consolidated will lose that info. Or replace the securable with the security when presenting to HMI but that too may be an issue when it doesn’t go through temporary objects.