Protecting Your Process

There are different levels of security that you can implement to protect your process. On one level, you can control the physical security of your machines and buildings. On another level, you can implement security for your operating system and your network using firewalls, passwords, and filters.

You can also restrict access to your iFIX applications and files, and protect your data files from unauthorized changes, by enabling iFIX security. This manual focuses on iFIX security. iFIX security is optional and is disabled by default. When you enable iFIX security, you can restrict:

  • Access to iFIX programs, operator displays, schedules, and recipes.
  • Access to critical program functions (for example, reloading the process database).
  • Write access to the process database.
  • Data entry and alarm acknowledgement, by requiring electronic signatures and verification. This can assist you in becoming compliant with the 21 CFR Part 11 regulation.

Enabling security also allows you to track all the changes to the process database and forces operators to log in to iFIX. Logging in requires a login name and an optional password. Depending on your configuration, this data can be the same or separate from your Windows® login name and password. Refer to the Using iFIX with Windows Security chapter for more information.

iFIX security is user-based, meaning operators cannot access iFIX applications, files, or database blocks unless you assign access to them. Assigning program, file, or database access to an operator is commonly referred to as assigning a privilege to that operator.

You can enable security using the Security Configuration program. This program is a flexible and easy-to-use application that lets you assign operator rights, login names, and passwords. Refer to the Defining and Assigning Security Privileges chapter for more information

See Also