Understanding iFIX Security

Your main design goal when developing an iFIX security strategy is to create group and user accounts. Using groups minimizes the amount of work needed to create the accounts while providing you with flexibility and power. For example, instead of creating five operator accounts that all assign the same security areas and application features, you can create one group account with these privileges and then assign the group account to the five operators.

To achieve this goal, assess your operators' needs and identify the common privileges they require. Once you identify these common privileges, you can create group accounts that provide them.

For example, John, Dave, Tim, and George are all iFIX operators. Their needs are summarized in the following table:

User name

Application features

Security areas

John

WorkSpace Runtime

Line 1, Line 2, and Line 3

Dave

WorkSpace Runtime

Line 1, Line 2, and Line 3

Tim

WorkSpace Runtime

Line 1, Line 2, and Line 3

George

WorkSpace Runtime

Line 1, Line 2, and Line 3

Since each operator requires access to the same application features and security areas, it is possible to create a group account called Operators that provides these privileges. Once you create the group account, you can assign it to each operator's user account, as the following figure shows.

Assigning Account Privileges with a Group Account

See Also