Using iFIX Security
Operators can log into iFIX manually or automatically. By logging in, operators identify themselves as iFIX users and gain access to pictures, recipes, and applications that they are authorized to use. Refer to the following sections for more details:
See Also
Preparing to Run the Security Synchronizer
Running the Security Synchronizer Application
When to Run the Security Synchronizer
Using the Security Synchronizer Automation Interface