The Security Section
The Global Security Subsection
Field | Description |
---|---|
Security Groups | Indicates whether to use the local security groups or the domain security groups. Note: To ensure a secure environment when using Historian, do not create any local user accounts unless Historian is set up on a standalone computer and the guest account is disabled. |
Enforce Strict Client Authentication | Indicates whether to use strict client authentication. If you enable this option, only clients using the security-token-based authentication protocol can connect. Clients using Historian versions prior to 6.0 and other Proficy software they connect to may not be able to connect unless they have the latest updates for that version. If you disable this option, clients of any version can connect if they use a valid user name and password. |
Enforce Strict Collector Authentication | Indicates whether to use strict collector authentication. If you enable this option, only collectors using the security-token-based authentication protocol can connect. Collectors using Historian versions prior to 6.0 and the other Proficy software they connect to may not be able to connect unless they have the latest updates for that version. If you disable this option, collectors of any version can connect. |
The Electronic Signatures / Records Subsection
The electronic signatures/records option assists users with government regulations such as the United States Food and Drug Administration's (FDA) 21 CFR Part 11 regulation or any site interested in added security by providing the ability to require a signature and password every time a change in data or configuration is requested. If you did not purchase the Electronic Signatures and Electronic Records option, the Electronic Signatures/Records field is disabled. For more information on Electronic Signatures and Records, refer to the Using Historian in a Regulated Environment section.
Field | Description |
---|---|
Require Point Verification | Indicates whether you must enter identifying information whenever you attempt a restricted action. Whenever you attempt to change the system configuration (for the tag, archive, or collector), a tag value, or another record, you must electronically sign the action with a username and password. If the user is authorized to make this change, the identity of the person, the action performed, and the time it was performed, are all recorded in the audit trail. Note:
Enabling electronic signatures and electronic records also requires you to reverify your identity when you use the Historian Excel add-in, modify or create a tag, or import data or messages. Note: This feature is available only if you have purchased the Electronic Signatures and Electronic Records option. |
Verification Message | When point verification is enabled, you are prompted to enter the username and password whenever you attempt to perform an action specified as requiring point verification. |