The steps that follow provide an overview of the steps to implement electronic signatures into your iFIX application.
To implement the Electronic Signature option, you must:
- Ensure that both the computer to be used to enter electronic signatures and the computer to be used as the SCADA node are equipped with hardware keys that have the Electronic Signature option enabled.
- Establish the appropriate security configuration, which includes:
- Enabling security and creating users and groups. This may be done using the iFIX Security Configurator, or by using the iFIX Security Synchronizer. Refer to Configuring Security and Using the Security Synchronizer for more information.
- Assigning the appropriate security areas to those users and groups.
- Assigning the appropriate application features to those users and groups. The application features available for electronic signature are:
- Electronic Signature - Perform By – Grants the user the ability to perform and sign for actions.
- Electronic Signature - Verify By – Grants the user the ability to verify actions that another user performs.
- Configure tags to require electronic signature.
- Configure the Alarm ODBC Service and your relational database. You must perform this step if you want to provide an audit trail of your process.