FT Security Sys Config
FT Security Sys Config
FT Security Sys Config
ATTENTION: Identifies information about practices or circumstances that can lead to personal injury or death, property damage, or economic loss.
Attentions help you identify a hazard, avoid a hazard, and recognize the consequence.
IMPORTANT Identifies information that is critical for successful application and understanding of the product.
BURN HAZARD: Labels may be on or inside the equipment, for example, a drive or motor, to alert people that surfaces may reach dangerous
temperatures.
ARC FLASH HAZARD: Labels may be on or inside the equipment, for example, a motor control center, to alert people to potential Arc Flash. Arc Flash
will cause severe injury or death. Wear proper Personal Protective Equipment (PPE). Follow ALL Regulatory requirements for safe work practices and
for Personal Protective Equipment (PPE).
Chapter 1
About FactoryTalk systems FactoryTalk systems................................................................................... 13
FactoryTalk Directory types ................................................................ 15
Accounts and groups............................................................................ 16
Account types ....................................................................................... 18
Applications and areas ........................................................................ 20
Security in a FactoryTalk system ....................................................... 20
Example: Two directories on one computer ..................................... 22
Chapter 2
Install FactoryTalk Services Install FactoryTalk Services Platform ..................................................... 25
Platform Install FactoryTalk System Service and FactoryTalk Policy Manager .. 26
Chapter 3
Getting started with FactoryTalk Security ................................................................................. 29
FactoryTalk Security Security on a local directory ................................................................ 31
Security on a network directory .......................................................... 31
How security authenticates user accounts ........................................32
Things you can secure ..........................................................................32
Best practices ........................................................................................ 34
Audit trails and regulatory compliance ..............................................36
Configure a computer to be the FactoryTalk Directory network server 38
Configure a computer to be the network directory server ...............39
Configure a network directory client computer ............................... 40
Check network directory server connection status .......................... 40
FactoryTalk Directory Server Location Utility ................................... 41
Chapter 4
Manage users Manage users ............................................................................................. 43
Add a FactoryTalk user account .......................................................... 43
Add a Windows-linked user account ..................................................45
Add group memberships to a user account ...................................... 46
Remove group memberships from a user account ............................47
Delete a user account .......................................................................... 48
Chapter 5
Manage user groups Manage user groups .................................................................................. 51
Add a FactoryTalk user group ............................................................ 52
Add a Windows-linked user group ..................................................... 53
Edit or view user group properties ..................................................... 55
Delete a user group ..............................................................................56
Add accounts to a FactoryTalk user group .........................................56
Remove accounts from a FactoryTalk user group ............................. 57
Chapter 6
Manage computers Manage computers ....................................................................................59
Add a computer ....................................................................................59
Delete a computer ............................................................................... 60
Edit or view computer properties ....................................................... 61
Chapter 7
Add and remove user-computer Add and remove user-computer pairs......................................................63
pairs Add a user-computer pair ....................................................................63
Remove a user-computer pair .............................................................65
Edit or view user account properties ..................................................65
Chapter 8
Add and remove action groups Add and remove action groups .................................................................67
Add an action group .............................................................................67
Delete an action group ........................................................................ 68
Add an action to an action group ....................................................... 69
Remove an action from an action group ........................................... 69
Chapter 9
Set system policies Authorize an application to access the FactoryTalk Directory .............. 72
FactoryTalk Service Application Authorization ................................. 73
FactoryTalk Service Application Authorization settings .................. 73
Publisher Certificate Information ...................................................... 75
Digitally signed FactoryTalk products................................................76
Authorize a service to use FactoryTalk Badge Logon ..............................76
FactoryTalk Badge Authorization ....................................................... 77
FactoryTalk Badge Authorization settings......................................... 77
Assign user rights to make system policy changes ................................. 78
User rights assignment policies ..........................................................79
User Rights Assignment Policy Properties ....................................... 80
Configure Securable Action ............................................................... 80
Chapter 10
Set product-specific policies Secure features of a single product ........................................................ 114
Secure multiple product features ........................................................... 114
Feature Security for Product Policies ..................................................... 115
Feature Security Policies .......................................................................... 116
Differences between securable actions and product policies ............... 116
Chapter 11
Manage logical names Logical names ........................................................................................... 119
Add a logical name ................................................................................... 121
Delete a logical name ............................................................................... 122
Add a device to a logical name ................................................................. 122
Chapter 12
Resource grouping Resource groupings ................................................................................. 129
Group hardware resources in an application or area............................ 130
Move a resource between areas ................................................................131
Remove a device from a resource grouping ............................................131
Resources Editor ...................................................................................... 132
Select Resources ....................................................................................... 133
Chapter 13
Secure resources Secure resources ...................................................................................... 135
Permissions ........................................................................................ 135
Breaking the chain of inheritance .............................................. 138
Order of precedence .................................................................... 139
Actions .......................................................................................... 140
Set FactoryTalk Directory permissions ............................................ 144
Set application permissions .............................................................. 145
Set area permissions .......................................................................... 147
Set System folder permissions .......................................................... 148
Set action group permissions ........................................................... 150
Set database permissions .................................................................. 151
Set logical name permissions ............................................................ 152
Allow a resource to inherit permissions ........................................... 153
Prevent a resource from inheriting permissions ............................ 154
View effective permissions................................................................ 155
Effective permission icons ................................................................ 156
Chapter 14
Disaster Recovery Back up a FactoryTalk system ................................................................. 159
Back up a FactoryTalk Directory ....................................................... 160
Back up a System folder..................................................................... 162
Back up an application....................................................................... 163
Back up a Security Authority identifier ............................................ 166
Backup................................................................................................. 167
Backup and restore options............................................................... 168
6 Rockwell Automation Publication FTSEC-QS001P-EN-E
Table of Contents
Appendix A
Upgrade FactoryTalk Services Upgrade FactoryTalk Services Platform.................................................201
Platform Identify the installed FactoryTalk Services Platform version ............. 202
Appendix B
FactoryTalk Web Services Install FactoryTalk Web Services ........................................................... 203
Add an HTTPS site binding for FactoryTalk Web Services ................. 204
Client computers unable to connect to FactoryTalk Web Services ..... 205
User cannot log into FactoryTalk Web Services.................................... 206
Appendix C
Introduction to FactoryTalk FactoryTalk Policy Manager and FactoryTalk System Services .......... 207
Policy Manager and FactoryTalk Install FactoryTalk System Services and FactoryTalk Policy Manager
.................................................................................................................. 208
System Services
Start FactoryTalk System Services ........................................................ 209
Log on to FactoryTalk Policy Manager................................................... 209
Navigate FactoryTalk Policy Manager ....................................................210
FactoryTalk Policy Manager Global Settings.......................................... 211
FactoryTalk Policy Manager planning .................................................... 213
FactoryTalk Policy Manager component considerations ...................... 214
Authentication methods .......................................................................... 215
Security Groups ........................................................................................ 215
Zones ......................................................................................................... 216
Add a zone........................................................................................... 217
Conduits .................................................................................................... 217
Add a conduit...................................................................................... 218
Devices ...................................................................................................... 219
Discovery ............................................................................................ 219
Add a device to a zone ........................................................................ 219
FactoryTalk Linx devices ................................................................... 221
Ports .................................................................................................... 221
Add a port .................................................................................... 222
Replace a device ................................................................................. 222
Remove the security policy from a device ........................................223
Ranges .......................................................................................................223
Add a range ........................................................................................ 224
Deploy a security model .......................................................................... 224
Backup and restore security models ...................................................... 226
Backup FactoryTalk System Services............................................... 226
Restore FactoryTalk System Services ...............................................227
Index
Summary of changes This manual includes new and updated information. Use these reference
tables to locate changed information.
Grammatical and editorial style changes are not included in this summary.
Global changes
None in this release.
About this publication This Quick Start Guide provides you with information on using FactoryTalk
Services Platform with FactoryTalk Security.
Before using this guide, review the FactoryTalk Services Platform Release
Notes for information about required software, hardware, and anomalies.
Legal Notices Rockwell Automation publishes legal notices, such as privacy policies, license
agreements, trademark disclosures, and other terms and conditions on the
Legal Notices page of the Rockwell Automation website.
A single computer can host both a local directory and a network directory. The
two directories are completely separate and do not share any information.
When using both directories, that single computer participates in two
separate FactoryTalk systems.
In the network directory example above, the directory hosts two network
applications: Waste Water and Water Distribution. All of the areas, data
servers, HMI servers, device servers, and alarm and event servers organized
within each application are specific to that application. None of the
application-specific information is shared with any other application in the
directory. However, all information and settings organized within the System
folder, such as security settings, system policies, product policies, and user
accounts apply to all applications held in the directory.
For example, modifying security settings in the Waste Water application does
not affect the Water Distribution application. However, making a change to a
security policy applies the change to both the Waste Water application and the
Water Distribution application. The security policy settings also apply to any
other new applications created in this same network directory.
See also
FactoryTalk Directory types on page 15
FactoryTalk Directory types The FactoryTalk Directory is the centerpiece of the FactoryTalk Services
Platform. FactoryTalk Directory provides a central lookup service for all
products participating in an application. Rather than a traditional system
design with multiple, duplicated databases or a central, replicated database,
FactoryTalk Directory references tags and other system elements from
multiple data sources—and makes the information available to clients
through a lookup service.
Tags are stored in their original environments, such as logic controllers.
Graphic displays are stored in the HMI servers where they are created. This
information is available, without duplication, to any FactoryTalk product
participating in an application.
See also
Example: Two directories on one computer on page 22
Configure a network directory client computer on page 40
FactoryTalk systems on page 13
Accounts and groups Create accounts for users, computers, and groups of users and computers to
define who can perform actions, and from where.
Security settings for accounts are stored in FactoryTalk Directory, and are
separate for FactoryTalk network and local directories. As much as possible,
secure resources by defining security permissions for the group accounts. Add
user and computer accounts to the groups, and all individual accounts in the
groups have the security settings of those groups.
Account status
By default, user accounts and group accounts have active status, which means
that the account can be used to access resources. Other possible account
statuses are:
• Disabled, prevents the user from accessing the account temporarily.
• Locked, the wrong password was entered more than a certain number
of times.
• Deleted, prevents the user from accessing the account permanently.
• Unknown, information about the account could not be obtained from
the network.
See also
Account types on page 18
Manage users on page 43
Manage user groups on page 51
Manage computers on page 59
See also
How security authenticates user accounts on page 32
Accounts and groups on page 16
Manage users on page 43
Applications and areas In a FactoryTalk Directory, elements such as data servers, alarm and event
servers, device servers, HMI servers, and project information are organized
into applications. A FactoryTalk Directory holds any number of applications,
stores information about each application, and makes that information
available to FactoryTalk products and services.
A FactoryTalk network directory can manage any number of separate network
applications. Likewise, a FactoryTalk local directory can manager any number
of separate local applications. When developing a FactoryTalk system, log on
to either a network directory or a local directory, create an application, add
device servers, data servers, and optional alarm and event servers.
Areas organize and subdivide applications in a network directory into logical
or physical divisions. For example, separate areas might correspond with
separate manufacturing lines in one facility, separate plants in different
geographical locations, or different manufacturing processes.
HMI Servers are added and configured using FactoryTalk View Studio, but
their status can be viewed in FactoryTalk Administration Console. The root of
an application in a network directory can contain only one HMI server. Create
a separate area for each HMI server added to an application. Areas cannot be
created within a local application.
See also
FactoryTalk Directory types on page 15
FactoryTalk systems on page 13
Authentication
FactoryTalk authenticates the user's identities to access a FactoryTalk system
against a defined set of user accounts held in the FactoryTalk Directory.
FactoryTalk verifies a user’s identity and that a request for service actually
originates with that user.
Authorization
FactoryTalk authorizes user requests to access resources in a FactoryTalk
system against a set of defined access permissions held in the FactoryTalk
Directory.
Securing resources
FactoryTalk Security addresses both authentication and authorization
concerns by helping define the answer to this question:
"Who can carry out what actions upon which secured resources from
which locations?"
• Who—refers to users and groups of users. Different users need
different access rights.
• Actions—refers to the operations to perform on a resource, such as
read, write, update, download, create, delete, edit, insert, and so on.
• Secured resources—refers to the objects for which actions are secured.
Each FactoryTalk product defines its own set of resources. For
example, some products might allow configuring security on resources
in an area, while others might allow configuring security for logic
controllers and other devices.
• Locations—refers to the location of the authorized computers. For
example, allowing values to be downloaded to a controller only from
workstations that are located within a clear line of sight to the plant
floor machinery to adhere to safety requirements.
The principle of inheritance determines how access permissions are set. For
example, when assigning security to an area in an application, all of the items
in the area inherit the security settings of the area. Override this behavior by
setting up security for one or more of the individual objects inside the area as
well.
When a user attempts to log on to a FactoryTalk system, FactoryTalk Security
verifies the user's identity. If the user is authenticated, FactoryTalk Security
continues to check the user's level of access to the system, to authorize the
actions the user performs on secured resources.
System-wide policies dictate some security settings. For example, setting up a
policy that requires users to change their passwords once every 90 days.
See also
Permissions on page 135
Best practices on page 34
FactoryTalk systems on page 13
Example: Two directories Different software products have different requirements for the FactoryTalk
Directory. Both directories are installed and configured as part of installing
on one computer the FactoryTalk Services Platform. The directory needed depends upon which
software products are used and whether working in a stand-alone or a
networked environment.
For example, if using FactoryTalk View SE or FactoryTalk Transaction
Manager, use the network directory to create and manage network
applications. If using FactoryTalk View ME, use the local directory to create
and manage local applications. Other products, such as RSLogix 5, RSLogix
500, and FactoryTalk Linx, allow using either directory.
Even though a local directory and a network directory reside on the same
computer, all of their project information and security settings remain
completely separate and cannot be shared, including:
• User accounts, passwords, security permissions
• System-wide policy settings, including security and audit policies
• Project information, such as applications, areas, and their contents
The graphic below shows three computers. Each computer has both a local
directory and a network directory configured. Each directory holds objects,
which represent project information, such as applications, references to data
servers, and security settings, including user accounts. In each local directory,
access to these project objects is only by software products installed on that
same local computer. The network directory, however, can share references to
its objects across a network.
For example, suppose each colored icon above represents the project
information and security settings that are part of a FactoryTalk system. The
local directories on each computer hold completely separate sets of
information (represented by the green, blue, and yellow icons). In the network
directory case, all client computers that point to the same network directory
server computer share the same set of information across the network
(represented by the orange icons).
See also
Applications and areas on page 20
FactoryTalk Directory types on page 15
FactoryTalk systems on page 13
Install FactoryTalk Services FactoryTalk Services Platform and FactoryTalk Security software are not
installed separately — FactoryTalk Security is an integrated part of the
Platform FactoryTalk Services Platform.
FactoryTalk Services Platform is installed from either:
• A FactoryTalk product installation disc, such as FactoryTalk View
(FactoryTalk Services Platform software is included on the installation
disc of every product that requires it); or,
• The Rockwell Automation Product Compatibility and Download
Center (PCDC) website. On the Compatibility & Downloads page, click
Find Downloads. On the Find Downloads page, in the Search box, type
"FTSP". FTSP-Download FT Services Platform appears in your
download list.
To install FactoryTalk Services Platform, you must log on to Windows with a
user account that is a member of the Windows Administrators group on the
local computer.
Install FactoryTalk Services Platform on every computer where you plan to
develop or run Network or Local applications. During installation several
components are installed on the computer, if any prerequisite software
components are not present on a computer, the installation program will
attempt to install the software.
Platform components and services currently include:
• FactoryTalk Directory
• FactoryTalk Security
• FactoryTalk Diagnostics
• FactoryTalk Live Data
• FactoryTalk Administration Console – a stand-alone tool for
configuring, managing, and securing applications.
All of these components and services install together as a platform, integrated
into the software install process for each FactoryTalk-enabled product.
FactoryTalk Web Services is not installed by default, and must be installed
separately.
Network security
For the latest network security considerations when using Rockwell
Automation products, visit the Rockwell Automation Knowledgebase.
For information about:
• File extensions created by Rockwell Automation software, firewall
rules, and service dependences, see Knowledgebase Document ID:
PN826 - Security considerations when using Rockwell Automation
Software Products.
• TCP/UDP ports used by Rockwell Automation products, see
Knowledgebase Document ID: BF7490 - TCP/UDP Ports Used by
Rockwell Automation Products.
See also
Product Compatibility and Download Center
FactoryTalk Web Services on page 203
Upgrade FactoryTalk Services Platform on page 201
Install FactoryTalk System FactoryTalk Services Platform version 6.11.00 includes two optional
components that are used to manage CIP Security; FactoryTalk System
Service and FactoryTalk Service and FactoryTalk Policy Manager.
Policy Manager FactoryTalk System Services provides these core security services:
• Authentication Service
Authenticates users and validates user resource requests. Validate user
credentials against the FactoryTalk Directory and FactoryTalk security
policy settings to obtain privileges associated with the user.
• Certificate Service
Issues and manages X.509v3 certificates for use within the FactoryTalk
system.
• Deployment Service
Translates the security policy model defined using FactoryTalk Policy
Manager to CIP configurations that are delivered to endpoints.
• Diagnostics Service
See also
FactoryTalk Policy Manager
See also
How security authenticates user accounts on page 32
Things you can secure on page 32
Best practices on page 34
Permissions on page 135
Secure resources on page 135
Security on a local By default, security is open in the FactoryTalk local directory. All users who
have successfully logged on to Windows have full access to the local directory.
directory
Because the network directory and local directory are separate, secure them
separately. Some Rockwell Automation software products require the
FactoryTalk network directory, others require the FactoryTalk local directory,
and some require both directories to be configured.
Manage on a local directory:
• User accounts, passwords, and security permissions
• System-wide policy settings, including security and audit policies
• Product information, such as applications, areas, and their contents
To tighten security on a stand-alone system, perform these tasks:
• Delete the Windows-linked group named Authenticated Users. This
prevents all users who have successfully logged on to Windows from
automatically having access to the FactoryTalk local directory.
• Remove security settings that allow all users to have full access to the
FactoryTalk local directory.
• Modify security policies to secure the system.
See also
Delete a user group on page 56
Secure resources on page 135
Security on a network By default, security is open in the FactoryTalk network directory. This means
that all users who are logged on to Windows with a user account that is a
directory member of the local Windows Administrators group on any computer
connected to the network directory have full access to the directory.
Because the network directory and local directory are separate, secure them
separately. Some Rockwell Automation software products require the
FactoryTalk network directory, others require the FactoryTalk local directory,
and some require configuring both directories.
Key steps to tighten security in a distributed system on a network include:
• Create one or more FactoryTalk user accounts or Windows-linked user
accounts, then add those accounts to the FactoryTalk Administrators
group. This retains administrative access to the FactoryTalk Directory
after removing the Windows Administrators group in the next step.
• Remove the Windows-linked group named Authenticated Users. This
prevents all user accounts on any local computer connected to the
network directory from automatically having access to the network
directory.
• Remove the security settings that allow all users full access to the
FactoryTalk network directory.
See also
Delete a user group on page 56
Secure resources on page 135
How security authenticates When a user attempts an action that is secured, security authenticates user
names and passwords in this order:
user accounts
1. Against the list of FactoryTalk user accounts. If a match is found, the
user is allowed to proceed.
2. Against the list of Windows-linked user accounts. If a match is found,
the user is allowed to proceed.
3. Against the list of accounts in a Windows-linked user group. If a match
is found for the user name and password in a Windows-linked user
group, the user is allowed to proceed, even if no Windows-linked user
account is present for that user.
To prevent some users in a Windows-linked group from having access to the
FactoryTalk system, create Windows-linked accounts for those users, and
then set permissions to deny access to those user accounts.
See also
Permissions on page 135
Account types on page 18
FactoryTalk Security on page 29
Things you can secure Use Allow or Deny permissions to secure access to resources in the system.
Resources include:
• The FactoryTalk network directory or local directory
• The System folder and its contents
• Applications
• Areas
• Servers
• Control networks
• Hardware devices
See also
Permissions on page 135
Best practices on page 34
Actions on page 140
FactoryTalk Security on page 29
Best practices Use these tips when setting up the FactoryTalk system to achieve efficient
management of user authentication and authorization.
Administrator accounts
• Always have more than one user account that is a member of the
FactoryTalk Administrators group. If the password to one
administrator account is lost, use a second administrator account to
reset the password to the first one. A lost password to a user account is
not recoverable. A second administrator account prevents being locked
out of the FactoryTalk system if the first administrator password is
lost.
• Always have at least one Windows-linked user account that is a
member of the FactoryTalk Administrators group. If the Windows-
Windows-linked accounts
If Windows accounts might move from one domain to another, avoid using
individual, Windows-linked user accounts. Use Windows-linked user group
accounts instead. Windows-linked user group accounts can move from one
domain to another, while keeping security permissions for the group accounts
intact. Windows-linked user accounts must be deleted and then recreated in
the new domain, causing the loss of all security permissions for the user
accounts. If this occurs all permissions for any individual Windows-linked
user accounts must be recreated.
Permissions
• Assign permissions to groups rather than to users.
• Assign permissions to user accounts only by exception. Maintaining
user accounts directly is inefficient.
• Wherever possible, remove Allow permissions instead of assigning
explicit Deny permissions. The order of precedence of explicit
permissions over inherited permissions makes administration
simpler, and Deny permissions take precedence over Allow
permissions.
• Use Deny permissions to:
• Exclude a subset of a group that has Allow permissions
• Exclude one special permission when full control to a user or group
is already granted
• Assign permissions at the highest level possible. This provides the
greatest breadth of effect with the least effort. Establish rights that are
adequate for the majority of users. For example, assign security to
areas rather than to objects within areas.
• Administrators should use an account with restrictive permissions to
perform routine, non-administrative tasks. Use an account with
broader permissions only when performing specific administrative
tasks.
See also
FactoryTalk Security on page 29
Account types on page 18
Permissions on page 135
Audit trails and regulatory To achieve compliance in regulated industries, the plant might be required to
keep records that answer these questions:
compliance
• Who performed a particular operation on a specific resource?
• Where did the operation occur?
• When did the operation occur?
• Who approved the operation?
To answer these questions:
• Ensure that all users are uniquely identifiable in the system
• Keep a record of deleted users
• Log information about user and system activity to diagnostic log files
• Set up audit trails of successful or unsuccessful attempts at modifying
system values
See also
Monitor security-related events on page 90
Audit policies on page 87
Configure a computer to be FactoryTalk Services Platform configures both a network directory and a local
directory on every computer where it is installed.
the FactoryTalk Directory
Use a network directory to organize project information and security settings
network server from multiple FactoryTalk products across multiple computers on a network.
After installing and activating FactoryTalk software, specify one of the
computers on the network as the network directory server. All computers on
the network to share FactoryTalk network directory services and resources.
Products such as FactoryTalk View SE and FactoryTalk Transaction Manager
use the network directory.
See also
Configure a computer to be the network directory server on page 39
Configure a network directory client computer on page 40
Check network directory server connection status on page 40
FactoryTalk Directory Server Location Utility on page 41
Configure a computer to be After installing and activating FactoryTalk software, specify one computer on
the network as the network directory server. All computers on the network
the network directory can share FactoryTalk network directory services and resources.
server After configuring the network directory server, configure the client
computers to reference the network directory.
See also
Check network directory server connection status on page 40
Configure a network directory client computer on page 40
FactoryTalk Directory Server Location Utility on page 41
Configure a network After specifying one of the computers on the network as the network
directory server, use the Specify FactoryTalk Directory Location utility to
directory client computer point each computer in the network to the FactoryTalk Directory network
directory server.
See also
Configure a computer to be the network directory server on page 39
Check network directory server connection status on page 40
Check network directory When a connection to the FactoryTalk network directory server is lost, the
system sends an error message to FactoryTalk Diagnostics. Likewise, when
server connection status the connection is restored, the system sends an information message to
FactoryTalk Diagnostics. Run the FactoryTalk Diagnostics Viewer to check
FactoryTalk Diagnostics for connection and error messages.
The network directory connection status is available from the FactoryTalk
Directory Server Location Utility.
When opening a network application and a connection to the network
directory server is not available, the information is based on the data held in a
See also
Configure a computer to be the FactoryTalk Directory network server
on page 38
FactoryTalk Directory Server Location Utility on page 41
FactoryTalk Directory How do I open the FactoryTalk Directory Server Location Utility?
See also
Configure a computer to be the network directory server on page 39
Configure a network directory client computer on page 40
Manage users
Manage users Use FactoryTalk Administration Console to add and delete FactoryTalk
Directory and Windows-linked user accounts. User accounts exist only in the
FactoryTalk Directory where the account was created.
Management of FactoryTalk user accounts includes:
• Adding group memberships to the user account
• Editing the user's name and description
• Associating an email address with the user's account
• Setting user password options
• Changing the user account password
• Enabling, disabling, or unlocking the user account
• Resetting the account password
Use Windows administrative tools to edit Windows-linked user accounts.
Important: Managing users requires explicit permissions. To verify
permissions, in FactoryTalk Administration Console Explorer,
expand System, then right-click Users and Groups and select
Security. Confirm the permissions listed in the prerequisites for
the task are present with the logged in user account.
See also
Add a FactoryTalk user account on page 43
Add a Windows-linked user account on page 45
Add group memberships to a user account on page 46
Manage user groups on page 51
Add a FactoryTalk user To create a user account that is separate from a user's Windows account, add
a FactoryTalk Directory account. FactoryTalk Directory accounts are managed
account by the FactoryTalk Administrator and specify the account's identity, account
policy, and group membership independent of the Windows account settings.
Prerequisites
Obtain these permissions for the Users folder in the Explorer window:
• Common > Create Children
• Common > List Children
See also
Add a Windows-linked user account on page 45
Delete a user account on page 48
Password Policy Settings on page 106
Account types on page 18
Manage users on page 43
Add a Windows-linked user Add a Windows-linked user account when the security needs of the Windows
network are the same as the security needs of the FactoryTalk system. When
account accessing FactoryTalk resources using a Windows-linked account, the
FactoryTalk Directory relies on Windows to determine whether the user's
name and password are valid, and whether the account is enabled or locked
out. Adding Windows-linked user accounts to FactoryTalk Security user
groups allows the FactoryTalk Directory to determine a Windows-linked
user's level of access to the FactoryTalk system independently of the user's
level of access to a Windows domain.
Add user accounts to the FactoryTalk network directory or local directory
from the list of users or groups in a Windows domain or workgroup. If the
computer is disconnected from the Windows domain, reconnect to the
domain before adding Windows-linked user accounts. Any users who
previously logged on to the Windows domain from that computer can log on
to FactoryTalk using their Windows-linked user account while the computer
is disconnected from the Windows domain.
Prerequisites
Adding a Windows-linked user account requires these permissions:
• Common > Create Children
• Common > List Children
• Common > Read
See also
Add a FactoryTalk user account on page 43
Add group memberships to To quickly change the permissions for a user account to those of an existing
FactoryTalk user group, assign the user account to the user group. New group
a user account memberships take effect only when the user logs off FactoryTalk and then
logs on again.
Prerequisites
Changing the group memberships of a user account requires these
permissions:
• Common > List Children
• Common > Read
• Common > Write
See also
Remove group memberships from a user account on page 47
Manage user groups on page 51
Permissions on page 135
FactoryTalk Security on page 29
Account types on page 18
Remove group When a user account belongs to a user group, the user account automatically
inherits all permissions assigned to the group, unless permissions are
memberships from a user specifically denied for the user account.
account Delete a group from Group Membership User Properties to remove the link
between the permissions of the user account and the permissions assigned to
that user group.
Changes to group memberships take effect only when the user logs off
FactoryTalk and then logs on again.
See also
Add group memberships to a user account on page 46
Manage user groups on page 51
Permissions on page 135
FactoryTalk Security on page 29
Account types on page 18
Delete a user account Delete a user account to permanently remove the account from the
FactoryTalk Directory. To prevent inadvertently locking an account out of the
FactoryTalk Directory, do not delete the last user account that is a member of
the Administrators group.
To delete a user account from both a network directory and a local directory,
delete the account from one directory, log off that directory, log on to the
second directory, and then delete the account in the second directory.
To temporarily prevent a user from logging on to FactoryTalk, disable the
FactoryTalk user account.
Prerequisites
Deleting a user account that is a member of a user group requires these
permissions:
• Common > Delete
• Common > List Children
• Common > Read
• Common > Write
Deleting a user account that is not a member of a user group requires these
permissions:
• Common > Delete
• Common > List Children
• Common > Read
See also
Add a FactoryTalk user account on page 43
Manage user groups Use FactoryTalk Administration Console to add and delete FactoryTalk and
Windows-linked user group accounts. Add both FactoryTalk and Windows-
linked user accounts to FactoryTalk user group accounts. Windows-linked
user groups, and the user accounts they contain, can move from one domain
to another while keeping security permissions for the group accounts intact.
FactoryTalk Services Platform includes these built-in user groups:
Group Name Description
Administrators Add user accounts to the Administrators user group to grant those user
accounts full control of areas, applications, users, and groups in the
FactoryTalk Directory. These permissions are defined by default.
Engineers No users or permissions are defined by default in FactoryTalk Services
Platform. Other software may use this group to establish permission
sets.
Maintenance No users or permissions are defined by default in FactoryTalk Services
Platform. Other software may use this group to establish permission
sets.
See also
Add a FactoryTalk user group on page 52
Add a Windows-linked user group on page 53
Add a FactoryTalk user Create a new FactoryTalk user group to administer security permissions for
specified users as a group. Change the memberships of a user account to
group quickly change the resources a user can access.
A FactoryTalk user group can contain:
• FactoryTalk user accounts
• Windows-linked user accounts
• FactoryTalk user group accounts
Use New User Group to add a FactoryTalk user group account to the
FactoryTalk Directory that is separate from a Windows user group account.
Then specify the group account's identity (for example, the name of the group)
and the user accounts that are members of the group.
Prerequisites
Adding a FactoryTalk user group requires these permissions:
• Common > Create Children
• Common > List Children
• Common > Read
See also
Delete a user group on page 56
Manage user groups on page 51
Add a Windows-linked user To move Windows accounts from one domain to another, create Windows-
linked user group accounts instead of individual Windows-linked user
group accounts. Windows-linked user group accounts, and the user accounts they
contain, can move from one domain to another while keeping security
permissions for the group accounts intact.
Add user groups from a Windows domain or workgroup to the FactoryTalk
system to allow the user accounts in the group to access the FactoryTalk
system. To modify the properties of a Windows-linked user group, (for
example the group's name, or which user accounts are group members),
modify these properties in Windows.
When adding a Windows-linked user group account, all user accounts in the
Windows user group have access to the FactoryTalk system. To prevent some
users in a Windows-linked group from accessing the FactoryTalk system,
create Windows-linked user accounts for those users, and set permissions to
deny access to those user accounts.
Prerequisites
1. Connect the computer to the Windows domain containing the user
groups to add to the FactoryTalk Directory.
2. Obtain these permissions in the User Groups folder in FactoryTalk
Administration Console Explorer:
• Common > Create Children
• Common > List Children
• Common > Read
See also
Delete a user account on page 48
Edit or view user group Modify the properties of a FactoryTalk user group account that is not linked
to a Windows user group account. View the properties of a Windows-linked
properties user group account. The name of a user group cannot change.
Group memberships added to a user group account take effect only when the
user logs off FactoryTalk and then logs on again.
Prerequisites
Editing or viewing user group properties requires these permissions:
• Common > List Children
• Common > Read
• Common > Write
See also
Add a FactoryTalk user group on page 52
Delete a user group Delete a user group when a particular group account is no longer needed to
manage a group of users. Before deleting the user group, view the properties
of the user group account.
To help prevent inadvertent lock out of the FactoryTalk Directory, the
Administrators group cannot be deleted.
Prerequisites
Deleting a user group account that has no members requires these
permissions:
• Common > Delete
• Common > List Children
• Common > Read
Deleting a user group account that has members requires these permissions:
• Common > Delete
• Common > List Children
• Common > Read
• Common > Write
See also
Edit or view user group properties on page 55
Manage user groups on page 51
Add accounts to a Any time after creating a FactoryTalk user group, add or remove the user
accounts that belong to the group. Members of a Windows-linked user group
FactoryTalk user group cannot be added or removed. However, individual Windows-linked user
accounts can be added to FactoryTalk user groups.
Tip: Alternatively, change the groups to which a user belongs. Use Group
Membership User Properties to add or remove user groups from a
FactoryTalk or Windows-linked user account.
See also
Remove accounts from a FactoryTalk user group on page 57
Add a FactoryTalk user group on page 52
Delete a user group on page 56
Manage user groups on page 51
Remove accounts from a After creating a FactoryTalk user group, members can be added or removed at
any time. However, after a Windows-linked user group is added to the
FactoryTalk user group FactoryTalk Directory, its members cannot be deleted or removed.
Tip: Alternatively, change the groups to which a user belongs. Use Group
Membership User Properties to add or remove groups from either a
FactoryTalk or Windows-linked user account.
See also
Add accounts to a FactoryTalk user group on page 56
Add a FactoryTalk user group on page 52
Add a Windows-linked user group on page 53
Delete a user group on page 56
Manage user groups on page 51
Manage computers
Manage computers Use FactoryTalk Administration Console to manage the computer accounts in
a FactoryTalk network directory. The FactoryTalk local directory does not
make use of computer accounts because all activity on the directory is
restricted to the local computer.
Tasks related to managing computers:
• Add a computer
• Delete a computer
• Add group memberships
• Remove group memberships
• Change the name of a client computer
• Change the name of a server computer
• Set the override directory cache policies
Important: Managing computers requires explicit permissions. To verify
permissions, in FactoryTalk Administration Console Explorer,
expand System, then right-click Computers and Groups and
select Security. Confirm the permissions listed in the
prerequisites for the task are present with the logged in user
account.
See also
Add a computer on page 59
Edit or view computer properties on page 61
Add a computer To allow a computer to access the FactoryTalk system, add a computer to a
FactoryTalk network directory. After adding the computer account, specify
security settings for the computer that allow or deny access to parts of the
FactoryTalk system or add the computer to a group account, and then specify
security settings for the group.
Important: Even if the security policy Require computer accounts for all
client machines is disabled, you must still create computer
accounts for any computers hosting servers — for example,
Terminal Servers, Rockwell Automation Device Servers
(FactoryTalk Linx), OPC data servers, Tag Alarm and Event Servers,
or HMI servers.
Prerequisites
Adding computer accounts requires these permissions:
• Common > Create Children
• Common > List Children
• Common > Read
See also
Delete a computer on page 60
Accounts and groups on page 16
Delete a computer Delete a computer from the FactoryTalk network directory to remove its
access to the FactoryTalk system.
Prerequisites
Deleting a computer account that is not a member of a computer group
requires these permissions:
• Common > Delete
• Common > List Children
• Common > Read
Deleting a computer account that is a member of a computer group requires
these permissions:
• Common > Delete
• Common > List Children
• Common > Read
• Common > Write
To delete a computer
• In FactoryTalk Administration Console Explorer, expand System >
Computers and Groups > Computers, right-click the computer
account, and then select Delete.
See also
Add a computer on page 59
Manage computers on page 59
Edit or view computer Modify the name of a computer, its description, and the computer groups to
which it belongs in General Computer Properties.
properties
Prerequisites
Editing or viewing computer properties requires these permissions:
• Common > List Children
• Common > Read
• Common > Write
See also
Add a computer on page 59
Add and remove user- Security for FactoryTalk resources is always tied to users or groups of users,
the actions the users perform, for example, read, write, and so on, and the
computer pairs computers, or groups of computers where the users work.
This ensures that only authorized personnel can perform actions on the
equipment and resources in the system from appropriate locations, for
example, computers located within line of sight of equipment.
Available options are:
• Add a user-computer pair
• Remove a user-computer pair
See also
Add a user-computer pair on page 63
Remove a user-computer pair on page 65
Prerequisites
• Obtain the appropriate permissions to specify security settings on the
selected resource.
See also
Remove a user-computer pair on page 65
Prerequisites
• Obtain the appropriate permissions to specify security settings on the
selected resource.
See also
Add a user-computer pair on page 63
Edit or view user account Use these steps to view and edit the general properties of a FactoryTalk user
account, such as user name and password, user description, user email
properties address, and user login method. These properties are only viewable for a
Windows-linked user account and cannot be edited. Use Windows to edit the
general properties of a Windows-linked user account.
Prerequisites
Obtain these permissions in the Users folder in FactoryTalk Administration
Console Explorer:
• Common > List Children
• Common > Read
• Common > Write
See also
Add a FactoryTalk user account on page 43
Manage users on page 43
Add and remove action To avoid setting permissions for individual actions, group actions together to
grant or deny permissions for a set of actions in one step.
groups
When adding an action group, decide:
• The name of the action group
• What actions belong to that group
Use action groups to assign permissions based on any convenient grouping.
For example:
• A person's role or job (operator, supervisor, maintenance engineer, and
so on)
• The equipment a person has access to (hoppers, mixers, ovens, and so
on)
When setting security using action groups:
• Add an action group
• Add actions to an action group
• Remove actions from an action group
• Delete an action group
See also
Add an action group on page 67
Delete an action group on page 69
Add an action to an action group on page 69
Add an action group Group actions together to grant or deny permissions for a set of actions in
one step rather than having to set permissions for each action separately.
When adding an action group, decide:
• The name of the action group
• What actions belong to that group
Prerequisites
Obtain these security permissions for the Action Groups folder in Explorer:
• Common > Read
See also
Delete an action group on page 68
Add and remove action groups on page 67
Delete an action group When an action group is deleted, any explicit permissions assigned to that
group are no longer in effect.
For example, suppose an action group named "Operators" was used to
explicitly grant write access to an area named "Mixing" for a user account
"Chris". If the "Operators" action group is deleted, "Chris" can no longer write
to the "Mixing" area. Creating another "Operators" action group will not
restore "Chris" the ability to write to "Mixing".
If an action group is inadvertently deleted and restoring the FactoryTalk
Directory from a backup is not feasible, all security permissions assigned to
the resources that were using the action group must be recreated.
Prerequisites
1. Before deleting an action group, back up the FactoryTalk Directory.
2. Deleting an acting group requires these security permissions for the
Action Groups folder:
• Common > Read
• Common > List Children
• Common > Delete
See also
Add an action group on page 67
Add and remove action groups on page 67
Add an action to an action To manage security settings for an action as part of an existing action group,
add the action to the action group.
group
Prerequisites
Adding an action to an action group requires these permissions for the Action
Groups folder in FactoryTalk Administration Console Explorer:
• Common > Read
• Common > List Children
• Common > Create Children
• Common > Write
See also
Add an action group on page 67
Add and remove action groups on page 67
Remove an action from an To stop managing security settings for a particular action as part of an action
group, remove the action from the action group.
action group
Prerequisites
Removing an action from an action group requires these security permissions
for the Action Groups folder in FactoryTalk Administration Console Explorer:
• Common > Read
• Common > List Children
• Common > Create Children
See also
Add and remove action groups on page 67
Set system policies to manage settings that apply across the entire FactoryTalk
system. Policy settings are separate in the network directory and the local
directory.
Navigate to System > Policies > System Policies to view and edit the
following:
• Application Authorization
Determines whether applications can access the FactoryTalk Directory.
• User Rights Assignment
Determines which users can perform system-wide actions, such as
backing up and restoring the contents of the FactoryTalk Directory,
changing the directory server computer, performing a manual
switchover to a redundant server, and modifying the security authority
identifier.
• Live Data Policy
Determines the default communications protocol for a distributed
FactoryTalk system.
• Health Monitoring Policy
Defines the parameters that the health monitoring service uses when
determining if a network error occurred and how long to wait before
switching to a standby server.
• Audit Policy
Defines which activities generate an audit message.
• Security Policy
Defines the security policies applied to FactoryTalk account, divided
into these categories: account policy, computer policy, directory
protection policy, password policy, and single sign-on policy. These
policies do not apply to Windows-linked accounts. Define policies for
Windows-linked accounts in Windows.
See also
Authorize an application to access the FactoryTalk Directory on page
72
See also
FactoryTalk Service Application Authorization settings on page 73
Publisher Certificate Information on page 75
Digitally signed FactoryTalk products on page 76
See also
Authorize an application to access the FactoryTalk Directory on page
72
FactoryTalk Service Application Authorization settings on page 73
FactoryTalk Service Use FactoryTalk Service Application Authorization settings to authorize the
applications that have access to FactoryTalk Directory.
Application Authorization
If the Verify Publisher Info option is selected, applications that are not signed
settings by Rockwell Automation or Microsoft are not allowed access to FactoryTalk
Directory.
The Application Authorization policy controls access by monitoring the
information of each application that is requesting a service token from
FactoryTalk. To configure the Application Authorization policy, log into
FactoryTalk with an account that is a member of the FactoryTalk
Administrators group.
To sort the application list by process name, version number, computer name,
publisher, or access allowed status, select the corresponding column header.
Column Description
Process Shows the process name of the application that is requesting a service
token.
Some applications are required by FactoryTalk and cannot be removed
or denied. These entries appear with gray text in the list.
To sort the application list by process name, computer name, or access
allowed status, select the corresponding column header.
Version Shows the version number of the application that is requesting a
service token.
Computer Shows the computer name where the application runs.
To sort the application list by process name, computer name, or access
allowed status, select the corresponding column header.
Publisher Info Shows the publisher name of the application. If no certificate exists,
the cell displays with None.
To view the detailed publisher certification information, select the
desired cell in this column.
Access Allowed Shows whether the current process is allowed to access to FactoryTalk
Directory and determines whether an application is authorized to
access the FactoryTalk Directory.
To deny an application, clear the check box of the entry. If an
application is denied access and fails the request for service token, a
message is sent to FactoryTalk Diagnostics, for example, Login failure
for application [RNASecurityTestClient.exe] on directory [Network]. The
application was denied access. View the messages using the
FactoryTalk Diagnostics Viewer.
Some applications are required by FactoryTalk and cannot be removed
or denied. These entries are displayed with gray text in the list.
Use these settings to specify how FactoryTalk allows access to the FactoryTalk
Directory.
Setting Description
Enable Default Access Determines whether new applications are automatically allowed access
to FactoryTalk Directory.
Default: Enabled
To disable the default access, clear the check box. All new applications
are automatically denied access.
If the default access of a FactoryTalk Directory server is disabled, you
can still configure your local computer to join the directory server.
Verify Publisher Info Determines whether to verify the publisher certificate information of
FactoryTalk applications.
If enabled, FactoryTalk Services Platform verifies whether the
application requesting a service token is signed by Rockwell
Automation or Microsoft. Any application not signed by them will fail to
receive a service token.
Default: Disabled
To disable the publisher information verification, clear the check box.
FactoryTalk Services Platform does not verify the publisher
information. Applications are verified by the corresponding Access
Allowed settings.
Some earlier versions of Microsoft applications (for example,
msiexec.exe) and FactoryTalk products were not signed when released.
The publisher information on these applications may fail verification.
See also
Authorize an application to access the FactoryTalk Directory on page
72
Publisher Certificate Information on page 75
Digitally signed FactoryTalk products on page 76
Publisher Certificate Use Publisher Certificate Information to view digital signature details and
verify the identity and authenticity of software.
Information
Field Description
Issued to Shows the publisher name (or a portion of the name) of the entity to which the certificate is issued.
Issued by Shows the name (or a portion of the name) of the issuer.
Status Shows the status of the certificate, for example, valid, revoked, or expired.
Serial # Shows the unique serial number (or a portion of the serial number) of the certificate.
Date signed Shows the date when the binary was signed.
Valid from Shows the beginning date of the period for which the certificate is valid.
Valid to Shows the ending date of the period for which the certificate is valid.
See also
Authorize an application to access the FactoryTalk Directory on page
72
FactoryTalk Service Application Authorization settings on page 73
Digitally signed FactoryTalk products on page 76
Digitally signed FactoryTalk FactoryTalk Services Platform 2.51 or later provides the ability to verify
whether an application requesting a service token is signed by Rockwell
products Automation. The access to FactoryTalk Directory is denied if the certification
is not signed by Rockwell Automation.
Some earlier versions of FactoryTalk products were not signed when released.
These products may fail to verify the publisher information.
This table shows which versions of FactoryTalk products are signed.
Products Signed since version
FactoryTalk Administration Console 2.10.01
FactoryTalk Administration Console 2.31.00
FactoryTalk Batch 11.00
eProcedure® 11.00
FactoryTalk Linx 5.20
FactoryTalk Linx Gateway 3.02
FactoryTalk Historian SE 3.0
FactoryTalk Metrics 9.10
FactoryTalk Transaction Manager 9.10
FactoryTalk View ME 5.10
FactoryTalk View SE 5.10
Logix Designer 21.00
RSLinx Classic 2.54
RSLogix 5 7.40
RSLogix 500 8.10
RSLogix 5000 18.00
RSNetWorx 9.00
RSSecurity Emulator 2.10.01
See also
Authorize an application to access the FactoryTalk Directory on page
72
Authorize a service to use Use FactoryTalk Badge Authorization to authorize services to use the
FactoryTalk Badge Logon function.
FactoryTalk Badge Logon
The service that requests access to use the FactoryTalk Badge Logon function
must be trusted by Rockwell Automation.
See also
FactoryTalk Badge Authorization on page 77
FactoryTalk Badge Authorization settings on page 77
See also
Authorize a service to use the FactoryTalk Badge Logon on page 76
FactoryTalk Badge Authorization settings on page 77
FactoryTalk Badge Use FactoryTalk Badge Authorization to authorize services to use the
FactoryTalk Badge Logon function.
Authorization settings
To sort the service list by process name, select the column header.
Column Description
Process Shows the process name of the service that is requesting the access to use the FactoryTalk Badge Logon
function.
The FactoryTalk services are not displayed in the list.
Use these settings to specify how FactoryTalk allow access to the services that
are requesting to use the FactoryTalk Badge Logon function.
• Add. Used to open the Select Application dialog box to select a service
that is requesting the FactoryTalk Badge Logon function.
• Remove. Used to remove one or more services that is using the
FactoryTalk Badge Logon function.
See also
Authorize a service to use the FactoryTalk Badge Logon on page 76
FactoryTalk Badge Authorization on page 77
Assign user rights to make In User Rights Assignment Policy Properties, specify which users are
permitted to:
system policy changes
• Back up or restore FactoryTalk Directory, the System folder, or
applications
• Change the FactoryTalk Directory server computer
• Switch between primary and secondary servers in a redundant pair
(for example, HMI servers, or data servers)
• Modify the security authority identifier
Policy settings are completely separate in the network directory and local
directory. The network directory and local directory also have different default
policy settings.
See also
User rights assignment policies on page 79
Permissions on page 135
User rights assignment In FactoryTalk, administrators control the rights that users have to access the
system. Settings that apply to the entire FactoryTalk directory are especially
policies important to secure. User rights assignment policies specify which users are
permitted to perform:
• Back up or restore FactoryTalk Directory, the System folder, or
applications. The default setting allows all users to back up and restore
the directory and its contents. Securing backup and restore operations
prevents an unauthorized user from:
• Copying applications or user account information in the
FactoryTalk system
• Intentionally or inadvertently overwriting the contents of
FactoryTalk Directory, including applications, user, computer, and
group accounts, passwords, policy settings, and security settings
• Change the FactoryTalk Directory server computer.
The default setting allows administrators to change the directory
server. The policy appears in only FactoryTalk network directory.
Verify the permissions to change the directory on the current
computer and the computer being switched to.
• Switch between primary and secondary servers in a redundant pair.
In the FactoryTalk network directory, the default setting allows all
users to switch between primary and secondary servers (such as HMI
servers or data servers). Because redundancy is available in only the
FactoryTalk network directory, this policy setting appears in only the
FactoryTalk network directory.
See also
Assign user rights to make system policy changes on page 78
User Rights Assignment Policy Properties on page 80
User Rights Assignment How do I open User Rights Assignment Policy Properties?
See also
Assign user rights to make system policy changes on page 78
User rights assignment policies on page 79
Permissions on page 135
See also
Secure features of a single product on page 114
Effective permission icons on page 156
Select a user or group Use Select User or Group to select a user account or FactoryTalk user group
account. You can then specify security settings for the user or group.
Use the options under Filters to show only users, only user groups, or all
accounts you may add to the group.
See also
Manage user groups on page 51
Accounts and groups on page 16
Account types on page 18
Change the default To change the default communications protocol for a distributed FactoryTalk
system, use Live Data Policy Properties.
communications protocol
Change this setting only if necessary. For example, if the system experiences
communications problems and troubleshooting requires switching to DCOM.
Thoroughly test communications before deploying this change to a running
production system. Keep in mind that many factors affect communications,
including firewalls, closed ports, and differences in network architectures and
configurations.
See also
Live Data Policy Properties on page 83
See also
Change the default communications protocol on page 82
FactoryTalk Directory types on page 15
Live Data Policy Properties How do I open Live Data Policy Properties?
1. In FactoryTalk Administration Console Explorer, expand System >
Policies > System Policies.
2. Right-click Live Data Policy and select Properties.
Use the Policy Settings tab of Live Data Policy Properties to select a default
communications protocol for a distributed FactoryTalk system.
This setting affects communications between client and server services and
between the FactoryTalk Directory and servers on the network. This setting is
considered a "default". If the FactoryTalk Live Data service detects that some
See also
Change the default communications protocol on page 82
Default communications protocol settings on page 82
FactoryTalk Directory types on page 15
Set network health Use Health Monitoring Policy Properties to fine tune the parameters that the
system uses when determining whether a network failure is occurring and
monitoring policies how long to wait before switching to a Standby server.
A network failure occurs when a server is temporarily unable to communicate
with other computers because of network traffic and fluctuations. During a
network failure, even though the computers in the redundant server pair
cannot communicate, the active server remains active and the standby server
remains on standby.
Tip: Changing health monitoring policy settings can have unexpected results.
The preset default settings typically provide optimal efficiency for most
networks.
See also
Health Monitoring Policy Properties on page 85
See also
Set network health monitoring policies on page 84
Set audit policies Use Audit Policy Properties to specify what security-related information is
recorded while the system is being used. Audit policies include whether
access checks are audited, whether access grants, denies, or both are audited,
and so on. Audit messages are sent to FactoryTalk Diagnostics, and are viewed
using the FactoryTalk Diagnostics Viewer.
See also
Audit policies on page 87
Audit trails and regulatory compliance on page 36
Example: Audit messages on page 91
Audit policies Auditing user actions in a control system helps answer "who changed this
process variable, when, and why?"
In an industry that must comply with governmental regulations, such as U.S.
Government 21 CFR Part 11, the plant must be able to answer this question.
The answer is also important if the plant manufactures products with critical
tolerances, or if unmanaged changes could negatively affect product quality or
risk consumer safety.
An audit trail records:
• The specific, authenticated user who is authorized to access the
manufacturing system
• The action taken—typically an operation that affects the
manufacturing control system or that creates, modifies, or deletes
some element of the manufacturing process
• The resource—an object such as a PLC-5®, application, tag, or
command, on which the user performs an action
• The computer from which the user performed the action
• The date and time when the user performed the action
See also
Set audit policies on page 86
Audit trails and regulatory compliance on page 36
Example: Audit messages on page 91
See also
Set audit policies on page 86
Audit trails and regulatory compliance on page 36
Audit policies on page 87
Monitor security-related Monitor security-related events to find out if changes are made to security
policies or other objects, who made the changes, and when they were made.
events Monitor security-related events by setting up audit policies.
In a FactoryTalk automation system, Rockwell Automation software products
monitor system activity and generate detailed diagnostic messages.
Meanwhile, FactoryTalk Diagnostics collects these activity, warning, error,
and audit messages from all participating products throughout a distributed
system and routes them to Local Logs on each computer. Depending on the
products installed and the configuration options set, FactoryTalk Diagnostics
can also route these messages to other centralized logging destinations, such
as an ODBC database or FactoryTalk® AssetCentre Audit Log.
See also
Set audit policies on page 86
Example: Audit messages If the setting Audit changes to configuration and control system is enabled in
Audit Policy, audit messages are generated when any configuration and
control system changes occur across the FactoryTalk system.
Examples of messages for adding and removing control system components:
• Added area [Line2] to application [Network/Paper Mill]
• Removed area [Line1b] from application [Network/PaperMill]
• Added graphic display [Overview] to area [Network/Paper Mill/Line2]
• Removed user [BBilly] from directory [Network/System]
• Downloaded project [PASTEURIZE] to processor
[/NetworkPath/Line1]
• Inserted rung [XIC B3/0 OTE B3/0] in processor [XYZ/File 2/Rung 10]
Examples of messages for modifying control system values:
• Modified properties of user [JSmith] in directory [Network/System]
• Modified properties of server [Line2HMI] in application
[Network/Paper Mill]
• Forced I/O [I1:2/15] in processor [TABLET10] from [OFF] to [ON]
• Changed security policy [Enforce password history] in directory
[Network/System] from [0] to [5]
• Changed value of tag [HighPressureLimit] in processor [TABLET10]
from [100] to [125]
• Changed value of tag [MaxFeederSpeed] in area [Network/Paper
Mill/Line1] from [200] to [300]
• Changed name of graphic display [Line1Overview] in area
[Network/Paper Mill/Line2] from [Line1Overview] to [Line2Overview]
See also
Audit policies on page 87
Set system security Use Security Policy Properties to define general rules for implementing
security across all FactoryTalk products in the system.
policies
• Account Policy Settings: Specify how FactoryTalk manages policies for
user, computer, and group accounts.
• Computer Policy Settings: Specify how computer accounts in the
FactoryTalk network directory can use remote access.
• Directory Protection Policy Settings: Specifies client computer
accounts usage of the FactoryTalk network directory.
• Password Policy Settings: Configures password requirements for
FactoryTalk user accounts.
See also
Modify Account Policy Settings on page 92
Modify Computer Policy Settings on page 93
Modify Directory Protection Policy Settings on page 95
Modify Password Policy Settings on page 96
Enable single sign-on on page 99
Modify Account Policy Use Account Policy Settings to change these security policy properties:
See also
Account Policy Settings on page 100
Audit trails and regulatory compliance on page 36
Enable single sign-on on page 99
Modify Computer Policy Use Computer Policy Settings to change these security policy properties:
Settings • Whether or not a user can connect to the FactoryTalk Directory from a
client computer that does not have a computer account in the network
directory
• How client computers connect to the FactoryTalk Directory through
Remote Desktop Services, and how the computer name appears in the
FactoryTalk Diagnostics log of actions.
These settings apply only to computers in the FactoryTalk network directory
because the FactoryTalk local directory does not permit remote access.
See also
Computer Policy Settings on page 102
Enable single sign-on on page 99
Modify Directory Protection Use Directory Protection Policy Settings to change the security policy
properties that determine:
Policy Settings
• If computers with FactoryTalk versions less than 2.50, which are
considered non-secure, can access a directory server with FactoryTalk
CPR 9 SR5 or later, and if so, whether or not an audit message is
generated
• How long cache files remain available after a client computer
disconnects from the server, and if a warning message displays
These settings apply only to computers in the FactoryTalk network directory.
See also
Computer Policy Settings on page 102
Enable single sign-on on page 99
Modify Password Policy Use Password Policy Settings to set security policy properties that control the
conditions for a valid FactoryTalk password, such as minimum and maximum
Settings password length, password encryption method, password complexity
requirements, and when a password expiration warning is given.
These policies do not apply to Windows-linked user accounts. Backing up the
FactoryTalk system folder before making changes to Password Policy Settings
is recommended.
See also
Password Policy Settings on page 106
Add a FactoryTalk user account on page 43
Back up a System folder on page 162
Modify Badge login policies Use Badge Login Policy Settings to specify how FactoryTalk user accounts
can login using an RFID badge. Badge login policies include whether login
using a badge is enabled, whether facility codes are required, the badge
provider, and the data format used by the badge. After this policy is enabled
and configured login options are available in FactoryTalk user account
properties and Badge IDs can be added to the FactoryTalk user account.
• Specify the length of bits that will be ignored when extracting the
data from the badge.
l. Use Facility Code
See also
Security Policy Properties on page 110
Badge Login Policy Settings
User Properties settings
Set login options for a FactoryTalk user account
Enable single sign-on Use Single Sign-On Policy Settings to configure security policy properties to
enable single sign-on capability. When single sign-on is enabled, only one log
on, per directory, on a given computer is allowed. Once logged on, all
participating FactoryTalk products that run in that directory on that
computer automatically use those same security credentials.
See also
Disable single sign-on on page 100
Security Policy Properties on page 110
Disable single sign-on To require users to log into each FactoryTalk product separately, configure
Single Sign-On Policy Settings to disable single sign-on capability.
See also
Enable single sign-on on page 99
Account Policy Settings Use Account Policy Settings to specify how FactoryTalk manages policies for
user, computer, and group accounts. Additional policy settings for computer
accounts are managed in Computer Policy Settings.
Setting Description
Logon session lease Sets the maximum number of hours that a user can remain logged on
before the system checks whether the user’s account is still valid. Use
this setting to prevent logged on users from retaining access
indefinitely, even after their accounts are disabled or deleted.
For example, if a user's account is disabled or its password changed, and
the account name and password cannot be reauthenticated, the logon
session becomes invalid. The user can no longer access secure system
resources until the user logs on successfully again.
Setting this value to 0 allows the logon session to be used indefinitely,
allowing users to have continuous access, and preventing the system
from automatically reauthenticating users. This means that the system
does not check whether the user’s account is still valid.
Minimum: 0 hours
Maximum: 999 hours
Default: 1 hour
Defaults:
• For the Network Directory, 3 invalid logon attempts.
• For the Local Directory, 0 invalid logon attempts.
Account lockout auto reset Specifies the amount of time that must expire before a locked account
is reset, allowing the user to attempt access again. Type a value
between 0 and 999 minutes to specify the amount of time a user must
wait before using the account again to gain access to the system.
If set to 0, locked accounts are not reset automatically. A FactoryTalk
administrator and must unlock the account manually.
Minimum: 0 minutes
Maximum: 999 minutes
Default: 15 minutes
Keep record of deleted accounts Determines whether user accounts can be permanently deleted with no
record retained in the system, or flagged as deleted and be permanently
disabled, with a record of the deleted account retained in the system.
To keep a record of accounts that were deleted, and force all new
accounts to be unique, select Enabled. Also, change a policy setting to
show deleted accounts in the list of users.
To discard accounts when they are deleted, select Disabled. This means
that if a user account is deleted, a user account can be recreated again
later with the same user name. If the policy is enabled and a user
account is deleted, a user account cannot be recreated again later with
the same user name, because its record still exists in the system.
If the policy is disabled and user account with the same name is
recreated, the new user account does not inherit the security settings of
the old account. The reason is that all user accounts are identified by
means of a unique identifier that is separate from the user name. When
deleting a user account, the user's access rights are deleted, but the
user account's unique identifier is not deleted.
When creating another user account with the same name, recreate the
security settings of the account. Either add the user account to a group
that already has security settings defined, or create permissions for a
user account when securing a resource.
For security and audit tracking reasons, and to satisfy compliance
requirements in regulated manufacturing industries, it might be
necessary to:
• Keep a record of previously deleted accounts
• Ensure that all user accounts can be uniquely identified in the system
Default: Disabled
Default: Disabled
See also
Modify Account Policy Settings on page 92
Audit trails and regulatory compliance on page 36
Security Policy Properties on page 110
Computer Policy Settings Computer Policy Settings control how computer accounts can access the
FactoryTalk Directory remotely. These settings apply only to computer
accounts in the FactoryTalk network directory because the FactoryTalk local
directory does not permit remote access.
Setting Description
Require computer accounts for all Determines whether client computers can access the FactoryTalk
client machines network directory without having a computer account in the network
directory. Disable this policy to allow users to connect remotely from any
computer, even if the computer does not have a computer account in
the FactoryTalk Directory.
Even when this setting is disabled, create computer accounts for any
computers hosting servers — for example, Rockwell Automation Device
Servers (FactoryTalk Linx, OPC data servers, Tag Alarm and Event
Servers, or HMI servers. Without the server computer accounts,
configuring the servers from client computers on the network is not
possible. The FactoryTalk network directory Server cannot locate these
servers on the network without their computer accounts.
Enabled allows users to log on to FactoryTalk only if they are logging on
from a client computer that has an account in the FactoryTalk Directory.
Even if set to Enabled, Remote Desktop Services clients can still log on to
FactoryTalk Directory without computer accounts if the Identify
terminal server clients using the name of policy is set to Server
Computer.
Disabled allows users to log on to FactoryTalk from any client computer,
even if that computer has no computer account in the FactoryTalk
network directory.
Default: Enabled
Important: If setting the Identify terminal server clients using the name of
policy to Server Computer, disable single sign-on because the
computer name is saved as part of the single sign-on user's
credentials, and might affect the level of access a Remote Desktop
Services user has to the FactoryTalk system.
See also
Modify Computer Policy Settings on page 93
Security Policy Properties on page 110
Directory Protection Policy The Directory Protection Policy Settings specify client computer accounts
usage of the FactoryTalk network directory.
Settings
Setting Description
See also
Modify Directory Protection Policy Settings on page 95
Cache expiration policies on page 105
Cache expiration policies In FactoryTalk, rules for directory cache expiration are managed system-wide
by the Directory Protection Policy Settings security policy properties. These
policies determine:
• How long cache files remain available after the client computer
disconnects from the server
• If a warning displays before the directory cache expires
Directory cache expiration policies for a specific computer or group of
computers can be customized. For example, to allow a group of laptop
computers to operate without a network connection for a longer time period,
and for the cache to never expire for one of the laptops. To override the
FactoryTalk network directory cache expiration policies, set directory cache
timeout policies for a computer group or an individual computer.
The directory cache timeout policies cannot be modified in a FactoryTalk local
directory.
Tip: The directory cache timeout policies are not supported if the client
computer is installed with FactoryTalk Services Platform version 2.40 or
earlier.
See also
Modify Directory Protection Policy Settings on page 95
FactoryTalk Security on page 29
Password Policy Settings For FactoryTalk user accounts, use Password Policy Settings to configure
these security property settings:
• Password encryption method
• Password complexity
• Minimum password length
• Number of previous passwords remembered
• Minimum password age
• Maximum password age
• Password expiration warning
See also
Add a FactoryTalk user account on page 43
Add a Windows-linked user account on page 45
Security Policy Properties on page 110
Single Sign-On Policy Use Single Sign-On Policy Settings in Security Policy Properties to set
whether users can log on once to the FactoryTalk system, or must log on to
Settings each FactoryTalk product separately.
Disable single sign-on if users will be connecting through Remote Desktop
Services using the name of the Remote Desktop Connection server computer.
This is determined through the computer policy setting Identify terminal
server clients using the name of. The computer name is saved as part of the
single sign-on user's credentials, and might affect the level of access a user has
to the FactoryTalk system.
Setting Description
Enabled Requires users to log on to the FactoryTalk system only once. The system
checks the user's access rights as the user performs actions after logging
on. If the user has the required access rights, the action is allowed to
proceed. If the user does not have the required access rights, the action is
prevented from taking place. The user is not prompted repeatedly to log on
with a user name and password.
Disabled Requires users to log on to each FactoryTalk product separately.
See also
When to disable single sign-on on page 110
Modify Computer Policy Settings on page 93
Security Policy Properties on page 110
When to disable single sign- If multiple users are sharing the same Windows user account, but have
different FactoryTalk user accounts, it might be necessary to disable single
on sign-on. This is because with single sign-on enabled, the last user that logged
on to FactoryTalk is automatically logged on to all subsequent FactoryTalk
products. If the ability to distinguish the actions of individual users is
necessary, disable single sign-on to force all users to identify themselves to
each FactoryTalk product they use.
There is no way to log all users off all FactoryTalk products simultaneously.
This is because some products might need to run without interruption in the
background. To log all users off all FactoryTalk products simultaneously, log
off Windows. Logging off Windows also shuts down all FactoryTalk products
that were started in the Windows session, regardless of how many users were
logged on.
Also disable single sign-on when logging on to FactoryTalk through Remote
Desktop Services using the name of the Remote Desktop Connection server
computer. Alternatively, change the security policy Identify terminal server
clients using the name of to allow Remote Desktop Services users to connect
using the name of the Remote Desktop Connection client computer.
If single sign-on still does not seem to be working properly, the FactoryTalk
product in use may not support the single sign-on capability. Some
FactoryTalk products always require users to log on, even if single sign-on is
enabled.
See also
Enable single sign-on on page 99
See also
Modify Account Policy Settings on page 92
Modify Computer Policy Settings on page 93
Modify Directory Protection Policy Settings on page 95
Modify Password Policy Settings on page 96
Modify Badge login policies on page 98
Navigate the Policy All Product Policies and System Policies windows contain the same features
to navigate to the property setting.
Properties windows
See also
Assign user rights to make system policy changes on page 78
Export policies to XML Export policies to save current FactoryTalk Directory policy settings to an
XML file. Use an XML or text comparison tool to determine policy changes
between exported policy files.
The exported policies are limited to the policies accessible by the logged on
user. If the logged-on user does not have Read, Execute, or List Children
permissions for a policy or its parent folders, that policy is not exported.
Prerequisites
Obtain permissions for each policy to be exported:
• Common > Read
• Common > Execute
• Common > List Children
See also
Export Policies
Set system security policies on page 91
See also
Secure features of a single product on page 114
Secure multiple product features on page 114
Differences between securable actions and product features on page
116
Secure features of a single To restrict access to one or more features of a single FactoryTalk property, use
Feature Security Properties.
product
See also
Feature Security for Product Policies on page 115
Permissions on page 135
Secure multiple product Use Feature Security for Product Policies to secure features of multiple
FactoryTalk products at once. The term action in Feature Security for Product
features Policies refers to a product feature. Each FactoryTalk product installed
provides different securable features (actions).
Select plus (+) next to each FactoryTalk product to view the features to secure.
See also
Secure features of a single product on page 114
Permissions on page 135
Differences between securable actions and product policies on page 116
Feature Security for How do I open Feature Security for Product Policies?
See also
Secure multiple product features on page 114
Permissions on page 135
Things you can secure on page 32
Differences between securable actions and product policies on page 116
See also
Secure features of a single product on page 114
Secure multiple product features on page 114
Differences between securable actions and product policies on page 116
See also
Secure features of a single product on page 114
Secure multiple product features on page 114
Secure resources on page 135
See also
Logical names on page 119
Add a logical name on page 121
Add a device to a logical name on page 122
Assign a control device to a logical name on page 123
Add a logical name to an area or application on page 124
Logical names A logical name is an alias that identifies a control network or device. Use
logical names to provide a shorter or more intuitive name to identify a device
instead of using its network relative path. Logical names also change the way
devices inherit security permissions.
Consider these questions:
See also
Add a logical name on page 121
Delete a logical name on page 122
Assign a control device to a logical name on page 123
Logical Name Properties on page 126
Add a logical name Add a logical name to Networks and Devices to create an alias that identifies
a control network or a device. Use a logical name to provide a shorter or more
intuitive name to identify a device, instead of using its network relative path.
Logical names also change the way devices inherit security permissions.
Control devices with identical logical names share security permissions across
different control networks and across different computers, without requiring
identical driver names or relying on identical network paths.
Add logical names in FactoryTalk Administration Console before configuring
security for RSLogix 5000 controllers. For all other types of control hardware,
choose whether to associate security settings with logical names or with
network relative paths.
Logical names can be added and configured in advance of creating areas or
applications.
See also
Add a logical name to an area or application on page 124
Add a device to a logical name on page 122
Delete a logical name on page 122
Delete a logical name Delete a logical name from Networks and Devices when not needed as an
alias for a control device or network. After deleting a logical name, the
security permissions for the devices associated with it revert to the
permissions of the device or network.
Important: Because RSLogix 5000 controllers do not use network relative
paths, deleting a logical name associated with a RSLogix 5000
controller can cause unexpected results.
See also
Add a logical name on page 121
Delete a logical name from an area or application on page 124
Logical names on page 119
Add a device to a logical Use Logical Name Properties to add control devices or networks to a logical
name so that they inherit the security permissions of the logical name.
name
See also
Remove a device from a logical name on page 122
Delete a logical name on page 122
Remove a device from a Use Logical Name Properties to remove a device association from a logical
name.
logical name
See also
Assign a control device to a logical name on page 123
Delete a logical name on page 122
Assign a control device to a A logical name is an alias that identifies a control network or device. Add
logical names in FactoryTalk Administration Console before configuring
logical name security for RSLogix 5000 controllers. If assigned to an area or application, a
logical name inherits the security permissions of that area or application.
Use Device Properties to assign a control device to an existing logical name or
add the device to a new logical name.
See also
Remove a device from a logical name on page 122
Add a logical name to an area or application on page 124
Add a logical name to an Devices with identical logical names share security permissions across
different control networks and across different computers, even if those
area or application devices are configured with different driver names or network paths. Add
logical names before configuring security for RSLogix 5000 controllers. For
all other types of control hardware, choose whether to associate security
settings with logical names or with network relative paths.
Add a logical name to an area or application when the permissions associated
with the logical name are inherited from that area or application.
Prerequisites
Adding a logical name requires these permissions for the area or application:
• Common > Create Children
• Common > List Children
• Common > Read
See also
Logical names on page 119
Delete a logical name from an area or application on page 124
Delete a logical name from Delete a logical name from an area or an application to break the link between
the logical name and the permissions associated with the area or application. .
an area or application
Prerequisites
Deleting a logical name requires these permissions for the application or area:
• Common > Delete
• Common > List Children
• Common > Read
See also
Logical names on page 119
Add a logical name to an area or application on page 124
After creating a new logical name, type a descriptive name to identify it.
See also
Add a logical name on page 121
Add a logical name to an area or application on page 124
Resources Editor on page 132
See also
Add a logical name on page 121
Add a device to a logical name on page 122
Remove a device from a logical name on page 122
Device Properties For control hardware displayed in the Networks and Devices tree, use Device
Properties to:
• View network relative paths
• Add a device to a new logical name
• Assign a control device to an existing logical name
• Change the logical name associated with the device
• Remove a device from a logical name
• Remove the control device from a resource grouping
Important: Do not remove RSLogix 5000 controllers from a logical name.
Because RSLogix 5000 controllers do not use network relative
paths, removing the device from a logical name can cause
unexpected results.
Setting Description
Device path Displays the network relative path of the device. This setting is read-only.
Logical name Associates a device with a logical name. Select a logical name to view the area associated with the logical name. The area
indicates the resource grouping to which the logical name belongs. Do either:
• To create a new logical name, select <New...>. In New Logical Name, enter a descriptive name and select OK.
• To associate the device with an existing logical name, or to change the logical name associated with the device, under
Logical name select the logical name.
• To remove the logical name the device is associated with, select None. The security system automatically uses the
security permissions associated with the device's network relative path.
Area associated with If the selected logical name is a member of a hardware resource grouping, this setting displays the area from which the
logical name inherits its security permissions. This setting is read-only.
Remove To remove the logical name from the area, select Remove. This removes the logical name from the resource grouping.
See also
Assign a control device to a logical name on page 123
Resource grouping
See also
Group hardware resources in an application or area on page 130
Move a resource between areas on page 131
Remove a device from a resource grouping on page 131
Resource groupings on page 129
Resource groupings A resource grouping is a collection of hardware resources from the Networks
and Devices tree that is associated with an application or area. A resource
grouping is not a separate account type.
Grouping resources under an application or area allows granting or denying
security permissions for a set of control hardware in one step, rather than
setting permissions for each device separately.
Create a resource grouping in any application or area in the FactoryTalk
Directory by selecting resources to associate with the area in the Resources
Editor. A resource grouping automatically inherits the security settings of the
application or area where the resource group is located.
These security permissions might be explicit permissions defined specifically
for the area, or they might be inherited from the application in which the area
is located, or from the FactoryTalk Directory in which the application is
located. If needed, set explicit permissions for a device that override the
security permissions set for its resource group by browsing for the network or
device in the Networks and Devices tree.
See also
Group hardware resources in an application or area on page 130
Remove a device from a resource grouping on page 131
Permissions on page 135
Group hardware resources Group hardware resources to manage their security settings through the
application or area. Devices in a resource grouping inherit security
in an application or area permissions from their associated application or area.
Prerequisites
Grouping hardware resources together requires these permissions for the
application or area:
• Common > Read
• Common > List Children
• Common > Configure Security
See also
Move a resource between areas on page 131
Remove a device from a resource grouping on page 131
Resource groupings on page 129
Move a resource between Use the Resources Editor to move a hardware resource from one application
or area to another. The device or control network that is moved inherits the
areas security permissions of its new area or application.
Prerequisites
Moving hardware resources between areas requires these permissions for the
application or area:
• Common > Read
• Common > List Children
• Common > Configure Security
See also
Group hardware resources in an application or area on page 130
Remove a device from a resource grouping on page 131
Resource groupings on page 129
Remove a device from a Remove a device from a resource grouping to break the link between its
security permissions and those of the application or area to which it belongs.
resource grouping
Prerequisites
Removing a device from a resource group requires these permissions for the
application or area:
• Common > Configure Security
• Common > List Children
• Common > Read
See also
Resource groupings on page 129
See also
Group hardware resources in an application or area on page 130
Remove a device from a resource grouping on page 131
Select Resources Use Select Resources to associate resources with an application or area.
Referenced the hardware devices by logical name or by network relative path.
Use these settings to specify how resources are added to the grouping.
Setting Description
Select resources to be associated with an area • To view the logical names for only those devices that are not already associated with an
application or area, select Show only logical names not associated with areas. Ignore
this setting if not using logical names with networks and devices.
• To view all logical names, even those already associated with an application or area, select
Show all logical names. Ignore this setting if not using logical names with networks and
devices.
• To add a logical name to the list of resources in the grouping, select the logical name and
select >. The same network or device (represented by a logical name) cannot be added to
multiple resource groupings.
• To add a device using its network relative path, expand the Networks and Devices tree
until the device is visible. Select the device and select >. The same network or device cannot
be added to multiple resource groupings.
Add New Logical Name Select to create a new logical name for a device.
Delete Logical Name Delete logical names that are no longer in use in the system, but remain visible in this dialog
box. This occurs if the device associated with a logical name was deleted. Delete Logical
Name is disabled if the selected logical name is in use.
Selected resources Shows the resources that are associated with the application or area. To remove a resource
from the list, select the resource and select <.
See also
Group hardware resources in an application or area on page 130
Resource groupings on page 129
Secure resources
Secure resources To secure the resources in the FactoryTalk system, select the resource, and use
Allow or Deny permissions to specify which users can perform what actions
on that resource from what computers. This helps ensure that only authorized
personnel can perform approved actions from appropriate locations.
Common actions include the ability to see the resource, to edit or delete it,
and to add additional items to the resource. Additional securable actions
might appear, depending on which FactoryTalk products installed.
Set security permissions for:
• FactoryTalk local or network directory
• Applications
• Areas
• System folder
• Action groups
• Policies
• Computers and Computer Groups
• Users and User Groups
• Connections, including databases
• Networks and devices
Security for networks and devices follows special rules for inheriting security
permissions, and includes the use of logical names, permission sets, and
resource groupings. For this reason, security for networks and devices is
covered in its own section.
See also
Permissions on page 135
Set FactoryTalk Directory permissions on page 144
View effective permissions on page 155
Actions on page 140
Secure networks and devices
Permissions Permissions determine which users can perform which actions on specific
resources in the system from which computers.
Effective permissions
To find out what actions a user or group can perform on a resource, view the
permissions in effect (effective permissions) for the resource. The effective
permissions are shown in the Effective Permissions tab of the Security
Settings for the resource.
Effective Permissions shows the permissions that are granted to the selected
user, computer, or group. When calculating effective permissions, the system
takes into account the permissions in effect from group membership, as well
as any permissions inherited from the parent object.
If a check mark appears for an action, permission is allowed, whether
explicitly or by inheritance. If a check mark does not appear, permission is
denied, whether explicitly or by inheritance. If a category (for example,
Common) shows a gray check mark, one or more – but not all – of the actions
inside the category is allowed. Expand the category to see which permissions
within it are allowed or denied.
See also
Breaking the chain of inheritance on page 138
Order of precedence on page 139
Secure resources on page 135
View effective permissions on page 155
Breaking the chain of By default, resources inherit permissions automatically from their parent
resources. For example, if assigning security to an area in an application, all
inheritance of the items in the area inherit the security settings of the area, and the area
inherits security settings from the application. The top of the hierarchy is the
network directory or local directory.
Override inherited permissions in two ways:
• Set up explicit permissions for resources at a lower level of the
hierarchy. For example, if an area inherits permissions from an
application, override the inherited permissions by specifying
permissions explicitly for the area.
• Break the chain of inheritance at a level in the network directory or
local directory tree. For example, stop an area from inheriting
permissions from the application in which it is located by selecting Do
not inherit permissions when setting up security for the area. When
breaking the chain of inheritance, specify whether to remove all
permissions from resources below the break (which then implies Deny
permission), or whether to use the permissions that are inherited by
the resource at the break as explicit permissions.
Permissions are inherited only as far up the network directory or local
directory tree as the chain of inheritance remains intact. For example, when
Do not inherit permissions for an area is selected, items that inherit
permissions inside the area can inherit permissions only as far as the area.
They cannot inherit permissions from the application in which the area is
See also
Permissions on page 135
Order of precedence on page 139
Secure resources on page 135
Order of precedence When the system evaluates the level of access a user, computer, or group has,
these rules apply:
• Deny permissions are implied. If no permissions are assigned to a
resource, Deny is implied. Use implied Deny permissions rather than
explicit Deny permissions wherever possible, because this simplifies
administration.
See also
Breaking the chain of inheritance on page 138
Permissions on page 135
Secure resources on page 135
Actions When setting up security, specify which actions a user or group can perform
on a selected resource. In a FactoryTalk network directory, specify from which
computer or group of computers a user can perform the action.
A group of common actions are installed by default with the FactoryTalk
Services Platform. However, different sets of actions apply to different
resources in the directory. Additional securable actions might appear,
depending on which FactoryTalk products are installed. For details about
using those actions, see the documentation for your FactoryTalk products.
Read
Controls whether a user or group can see the resource in the Explorer from a
computer or group of computers.
Resource type Result of Denying "Read"
Network directory or local directory Prevents users from seeing the directory or its contents.
Application Prevents users from seeing the application or its contents. Denying Read does not prevent users
from reading tag values from data servers in the application.
Area Prevents users from seeing the area or its contents. Denying Read does not prevent users from
reading tag values from data servers in the area.
System folder Prevents users from seeing the System folder or its contents. Denying Read does not prevent
users from reading tag values for devices in the Networks and Devices tree.
Networks and Devices tree Prevents users from seeing the Networks and Devices tree and its contents. Denying Read does
not prevent users from reading tag values for a particular device.
Individual network or device in the Networks and Devices tree Prevents users from seeing the network or device and its contents. Denying Read does not
prevent users from reading tag values for a particular device.
Write
Controls whether a user or group can write to the resource from a computer
or group of computers.
Resource type Result of Denying "Write"
Network directory or local directory Prevents users from modifying the properties of any item in the directory. For example, denying
Write prevents users from modifying the description of an application, area, or the properties of
a data server. However, if Create Children is allowed, the user or group can create applications in
the directory, add areas to an application, and add data servers to areas.
Application Prevents users from modifying the properties of any item in the application. For example, denying
Write prevents users from modifying the description of the application, the descriptions of areas
within the application, or the properties of data servers within the application or its areas.
However, if Create Children is allowed, the user or group can add areas or data servers to an
application, and can add data servers to areas.
Area Prevents users from modifying the properties of any item in the area. For example, denying Write
prevents users from modifying the description of the area, or the properties of data servers
within the area. However, if Create Children is allowed, the user or group can add areas or data
servers within the area.
System folder Prevents users from modifying the properties of any item in the System folder. For example,
denying Write prevents users from modifying policy settings, and the properties of user
accounts, such as an account's description or group memberships. Denying Write also prevents
deleting user and group accounts, if the accounts have group memberships associated with
them. This is because the group memberships are updated automatically when an account is
deleted, and updating group memberships is controlled by the Write action.
Networks and Devices tree Prevents users from defining, modifying, or removing logical names for networks or devices.
Denying Write does not prevent users from writing tag values to devices.
Individual network or device in the Networks and Devices tree Prevents users from defining, modifying, or removing logical names for the network or device.
Denying Write does not prevent users from writing tag values to devices.
Configure Security
Controls whether a user or group can change the security permissions for the
resource, while working from a computer or group of computers, by using
FactoryTalk Administration Console and selecting Security for the resource.
Denying Configure Security has the same effect on all types of securable
resources. For example, if a user is denied Configure Security for an area, the
user cannot change the security settings of the area, such as allowing or
denying users permission to perform actions in the area, while working from
the specified computer or group of computers.
Similarly, denying Configure Security on the Users and Groups folder
prevents users from setting security permissions for the Users and Groups
folder. Denying Configure Security on the Users and Groups folder does not
limit the access users have to resources in the system.
Create Children
Controls whether a user or group can create a new, related resource beneath
an existing resource in the FactoryTalk Administration Console directory tree
while working from a computer or group of computers.
Resource type Result of Denying "Create Children"
Network directory or local directory Prevents users from creating applications or areas.
Application Prevents users from creating areas or data servers in the application.
Area Prevents users from seeing the area or its contents. Denying Read does not prevent users from
reading tag values from data servers in the area.
System folder Prevents users from creating user, computer, or group accounts. Denying Create Children has no
effect on policies.
Networks and Devices tree Create Children is not available because users cannot add items to the Networks and Devices
tree. Networks and Devices is populated automatically, based on the networks and devices that
are available to your local computer.
Individual network or device in the Networks and Devices tree Create Children is not available because users cannot add items to the Networks and Devices
tree. Networks and Devices is populated automatically, based on the networks and devices that
are available to your local computer.
List Children
Controls whether a user or group can list the children of the resource from a
computer or group of computers.
Denying List Children has the same effect on all types of securable resources.
For example, if List Children access is denied to an application, the user or
group can see the application, but not its contents while working from the
specified computer or group of computers.
Execute
Controls whether a user or group can perform an executable action from a
computer or group of computers. The Execute action is used primarily for
Product Policy Feature Security settings.
Instead of using the Execute action, each FactoryTalk product can use its own
actions to secure its executable features. For details about what, if anything,
the Execute action does in a particular FactoryTalk product, see the
documentation for that product.
Delete
Resource type Result of Denying "Delete"
Network directory or local directory Prevents users from deleting any item in the directory, for example, applications, areas, data
servers, or user accounts.
Application Prevents users from deleting the application, or any item within it, for example, areas, or data
servers.
Area Prevents users from deleting the area, or any item within it, for example, data servers within the
area.
System folder Prevents users from deleting any item in the System folder, for example, user, computer, or group
accounts. If a user, computer, or group account has group memberships associated with it,
deleting the account also requires Write permission, because updating the group memberships
of accounts is controlled by the Write action.
Networks and Devices tree The Delete action is not available because users cannot remove items from the Networks and
Devices tree. Networks and Devices is populated automatically, based on the networks and
devices that are available to your local computer.
Individual network or device in the Networks and Devices tree The Delete action is not available because users cannot remove items from the Networks and
Devices tree. Networks and Devices is populated automatically, based on the networks and
devices that are available to your local computer.
See also
Things you can secure on page 32
Account types on page 18
Differences between securable actions and product policies on page 116
Effective permission icons on page 156
Secure features of a single product on page 114
Set FactoryTalk Directory Set permissions on your FactoryTalk Directory folder to control whether a
user or group can:
permissions
• See the directory or its contents (Read)
• Modify the properties of any item in the directory (Write)
• Add applications, areas, and data servers to the directory (Create
Children)
• Change the security settings of the directory (Configure Security)
• View child folders within the directory (List Children)
• Write tags in data servers (Write Value)
• Perform other product-specific actions
• Perform actions defined in user action groups
Tip: • Denying Write prevents users from modifying the properties of any item
in the directory. However, if Create Children is allowed, the user or
group can add items to the directory.
• The Write Value action does not prevent users from writing values to
tags in specific hardware devices.
Prerequisites
Setting FactoryTalk Directory permissions requires these permissions:
• Common > Read
• Common > Configure Security
See also
Security Settings-Permissions
Security Settings-Effective Permissions
Security Settings-Inherit Permissions
Actions on page 140
Secure resources on page 135
Set application permissions Set permissions on the application to control whether a user-computer pair
can:
• See the application or its contents (Read)
• Modify the properties of any item in the application (Write)
• Add areas or data servers to the application (Create Children)
• Change the security settings of the application (Configure Security)
• View the contents of the application (List Children)
• Delete the application or any item within it (Delete)
• Write tags in data servers (Write Value)
• Perform other product-specific actions
• Perform actions defined in user action groups
If a resource grouping is associated with the application, the networks or
devices in the resource grouping inherit the security permissions of the
application.
Prerequisites
Setting application permissions requires these security permissions:
• Common > Read
• Common > Configure Security
See also
View effective permissions on page 155
Add a user-computer pair on page 63
Set area permissions Set permissions on an area in order to control whether a user-computer pair
can:
• See the area or its contents (Read)
• Modify the properties of any item in the area (Write)
• Add areas or data servers to the area (Create Children)
• Change the security settings of the area (Configure Security)
• View the contents of the area (List Children)
• Delete the area or any item within it (Delete)
• Write tags in data servers (Write Value)
• Perform other product-specific actions
• Perform actions defined in user action groups
For example, set Read and Write permissions to the Ingredients area within
an application to allow the operators of the Ingredients machinery to read and
write values to and from controllers in their own area, but only when using
computers located within sight of the equipment.
If a resource grouping is associated with the area, the networks or devices in
the resource grouping inherit the security permissions of the area.
Tip: • Denying Read does not prevent users from reading tag values from data
servers in the area.
• Denying Write prevents users from modifying the properties of any item
in the area. However, if Create Children is allowed, users can add areas
or data servers within the area.
• The Write Value action does not prevent users from writing values to
tags in specific hardware devices.
Prerequisites
Setting area permissions requires these security permissions:
• Common > Read
• Common > Configure Security
See also
View effective permissions on page 155
Add a user-computer pair on page 63
Actions on page 140
Secure resources on page 135
Set System folder Set permissions on the System folder to control whether a user-computer pair
can:
permissions
• See the System folder or its contents (Read)
• Modify the properties of any item in the System folder (Write)
• Add user, user group, computer, or computer group accounts (Create
Children)
• Change the security settings of the System folder (Configure Security)
• View the contents of the System folder (List Children)
• Delete the System folder or any item within it (Delete)
• Write tags in data servers (Write Value)
• Perform other product-specific actions
• Perform actions defined in user action groups
Prerequisites
Obtain the following security permissions for the System folder:
• Common > Read
• Common > Configure Security
See also
View effective permissions on page 155
Add a user-computer pair on page 63
Actions on page 140
Secure resources on page 135
Set action group Set permissions on an action group to control whether a user-computer pair
can:
permissions
• See the action group (Read)
• Modify the properties of the action group (Write)
• Change the security settings of the action group (Configure Security)
• Delete the action group (Delete)
• Perform actions defined in another user action group
Prerequisites
Setting action group permissions requires these security permissions:
• Common > Read
• Common > Configure Security
See also
View effective permissions on page 155
Add a user-computer pair on page 63
Add and remove action groups on page 67
Actions on page 140
Secure resources on page 135
Set database permissions Set permissions on a database to specify which user-computer pairs can:
• See the database
• Modify the properties of the database (Write)
• Change the security settings of the database (Configure Security)
• Delete the database within it (Delete)
• Perform actions defined in a user action group
Prerequisites
Setting database permissions requires these security permissions:
• Common > Read
• Common > Configure Security
See also
View effective permissions on page 155
Add a user-computer pair on page 63
Actions on page 140
Secure resources on page 135
Set logical name Set permissions on the logical name to control whether a user-computer pair
can:
permissions
• See the logical name (Read)
• Modify the properties of the logical name (Write)
• Change the security settings of the logical name (Configure Security)
• Delete the logical name (Delete)
• Perform actions defined in a user action group
Prerequisites
Setting logical name permissions requires these security permissions:
• Common > Read
• Common > Configure Security
See also
Secure resources on page 135
Allow a resource to inherit Permissions determine which users can perform which actions on specific
resources in the system from which computers. Set Allow and Deny
permissions permissions on resources.
Allow a resource to inherit permissions when the selected resource has the
same permissions as its parent resource. For example, if assigning security to
an area in an application, all of the items in the area inherit the security
settings of the area. By default, the area inherits security settings from the
application. The top of the hierarchy is the network directory or local
directory.
See also
Prevent a resource from inheriting permissions on page 154
Secure resources on page 135
Effective permission icons on page 156
Permissions on page 135
Prevent a resource from When the chain of inheritance is broken, the resource no longer inherits
permissions from its parent resources. For example, when setting up security
inheriting permissions for an area, selecting Do not inherit permissions stops the area from
inheriting permission from the application in which it is located
See also
Allow a resource to inherit permissions on page 153
Secure resources on page 135
Effective permission icons on page 156
Permissions on page 135
View effective permissions To determine what permissions are currently in effect for a resource, use the
Effective Permissions tab in Security Settings. View the permissions in effect
for:
• a user or group of users, and
• a computer or group of computers
For example, in Security Settings for an area, the Effective Permissions tab
can show whether the selected users and computers can read the contents of
the area.
To view the permissions in effect for a computer or group of computers, use a
FactoryTalk network directory, because a FactoryTalk local directory is
restricted to a single computer.
Prerequisites
Viewing effective permissions requires these security permissions for the
resource (for example, an application) or the container (for example, an area)
the resource is located in:
• Common > Read
• Common > Configure Security
See also
Permissions on page 135
Secure resources on page 135
Effective permission icons Security Settings indicate which permissions are in effect for an action.
Icon Description
Cleared box beside an action means that no permissions are assigned. If both Allow and Deny are cleared beside an action, Deny is implied for the
action.
A cleared option shown beside the name of a group of actions, for example, All Actions or Common, means that some of the actions within that
group do not have permissions assigned. If collapsed, expand the group to see which actions do not have permissions assigned.
A black check mark means that Allow or Deny permissions were assigned explicitly.
A gray check mark means that Allow or Deny permissions were inherited.
These examples show how the Allow and Deny columns indicate what
permissions were set for the resource.
Inherited permissions
Explicit permissions
If Allow is selected beside All Actions, black check marks appear. This means
the inherited values are overridden and Allow on All Actions is explicitly
granted. If the inherited permissions change later, the change does affect this
security setting.
In this example, the resource does not inherit permissions from its parent
(this illustration shows configuring security for the FactoryTalk network
directory, which has no parent). If all actions are set to Allow, and then Deny
beside Read is selected:
• All Actions and Common are cleared. Because they represent groups of
actions, the cleared options beside All Actions and Common mean that
not all of the actions within those groups are selected in the Allow
In this example, the resource inherits permissions from its parent (for
example, an area might inherit permissions from an application). If all actions
are set to Allow, and Deny beside Read is selected:
• All Actions and Common are cleared, but because these options
previously inherited permissions, they now contain gray check marks.
Expand the group to see which actions do not have Allow permissions.
• For the Read action, Allow is cleared, but because it previously
inherited permissions, Read now contains a gray check mark. Because
explicit permissions take precedence over inherited permissions, these
selections indicate that Read access is denied.
See also
Allow a resource to inherit permissions on page 153
Prevent a resource from inheriting permissions on page 154
Secure resources on page 135
Disaster Recovery
Back up a FactoryTalk For safekeeping and disaster recovery, or to move a FactoryTalk system from
one set of computers to another, backup and restore an archive containing
system one of the following:
• An entire FactoryTalk Directory with all of its applications and its
System folder.
• Only an individual application, with or without the System folder. An
application archive file typically contains areas (in a network
directory), resource grouping information, and references to data
servers, device servers, alarm servers, and HMI servers.
• Only a System folder. The System folder includes a list of user,
computer, and group accounts, passwords, system policy settings,
product policy settings, system security settings, action groups, and
alarm and event database definitions.
The backup process creates an archive file that contains only objects and
references to objects held within the FactoryTalk Directory. The archive file
does not contain project files that are specific to individual products.
FactoryTalk Services Platform 6.10 applies a new encryption algorithm to the
backup file for enhanced security. Backups created using FactoryTalk Services
Platform 6.10 can only be restored to host computers that are also running
FactoryTalk Services Platform 6.10 or later. Backups created using FactoryTalk
Services Platform 2.90 or later can be restored onto host computers that are
running FactoryTalk Services Platform 6.10.
Important: Take care to choose the correct backup options when creating a
backup archive. Restoring from the wrong type of backup archive
can overwrite existing data that affects all applications.
See also
Back up a FactoryTalk Directory on page 160
Back up an application on page 163
Back up a System folder on page 162
Prerequisites
• Obtain the security permissions needed to perform backup and
restore operations. Open System > Policies > System Policies, and
open User Rights Assignment. Under Backup and Restore > Backup
and restore directory contents select Configure Security and verify
access permissions have been granted.
5. Select OK.
Unless a different file name was specified, FactoryTalk Administration
Console creates a directory backup file with its current security
authority identifier in the default location or in the location specified.
If a backup file with the same name already exists in the location
selected, the system asks whether to overwrite the existing file.
6. After backing up a directory, perform backups of project files and
databases from individual software products that are participating in
the FactoryTalk system.
If the applications include:
• HMI servers: Back up FactoryTalk View files separately. See
FactoryTalk View documentation for help.
• RSLinx Classic data servers: Run the RSLinx Backup Restore utility
to back up the data server configuration. From the Windows Start
menu, select Rockwell Software > RSLinx > Backup Restore Utility.
• FactoryTalk Linx servers: The base configuration of the FactoryTalk
Linx server is included in the backup, including redundancy and
alarms and events configurations. To retain device, driver, and
shortcut configurations, make a copy of the file RSLinxNG.xml and
keep it with your backup archive. By default the file is located in
C:\ProgramData\Rockwell\RSLinxEnterprise.
• FactoryTalk Linx Data Bridge: Open FactoryTalk Linx Data Bridge,
select File > Export configuration. Keep the exported file with your
backup archive.
• FactoryTalk Linx Gateway: Make a copy the FTLinxGateway.xml
file and keep it with your backup archive. By default the file is
located in C:\ProgramData\Rockwell\FactoryTalk Linx
Gateway.
• FactoryTalk Linx OPC UA Connectors: The base configuration for
the OPC UA Connector can be restored. After the restore operation
is completed, you will need to regenerate a certificate and enter a
password to return the OPC UA Connector to full operation.
• FactoryTalk Alarms and Events Logs: Use Microsoft SQL Server®
tools to back up and restore database files.
• FactoryTalk Transaction Manager: Back up project files using the
Configuration menu. See FactoryTalk Transaction Manager
documentation for help.
See also
Restore a FactoryTalk Directory on page 170
Backup on page 167
Back up a System folder on page 162
Back up an application on page 163
Backup and restore options on page 168
Back up a System folder Back up a System folder to create a backup archive that contains:
• The list of user, computer, and group accounts
• Action groups
• Passwords
• Policy settings
• Security settings
• Alarm and event database definitions
Restoring a System folder archive to a FactoryTalk Directory overwrites the
contents of the existing System folder with the contents in the backup archive.
Prerequisites
• Obtain the security permissions needed to perform backup and restore
operations. Expand System > Policies > System Policies, and open User
Rights Assignment.
See also
Restore (System folder) on page 186
Restore a System folder on page 172
Backup resources on page 168
Backup on page 167
Back up an application An application typically contains areas (in a network directory), resource
grouping information, and references to data servers, device servers, alarm
servers, and HMI servers.
Back up an application and create an archive file to:
• Restore the application to a FactoryTalk Directory on a different
computer
• Duplicate the application with a different name within the same
directory
Prerequisites
• Obtain the security permissions needed to perform backup and restore
operations. Open System > Policies > System Policies, and double-click
User Rights Assignment.
To back up an application
1. In FactoryTalk Administration Console Explorer, right-click the
selected application, and select Backup.
2. Use the default name or enter another name for the backup file.
3. Use the default archive location or specify another location by selecting
Browse, selecting a location, and then selecting OK in the Browse for
Folder window.
4. To back up the application without including the System folder, clear
the Backup System in archive check box. To include the System folder
in the backup, select the Backup System in archive check box.
Tip: You can still choose to restore only the application from the backup
archive file later even if you include the System folder in the backup.
5. To encrypt your archive file, select the Encrypt file contents check box,
and then enter the same passphrase in the Passphrase and Confirm
passphrase fields. If you clear this check box, your backup archive file
will not be encrypted or protected.
The Encrypt file contents check box will not be available if your
operating system does not support the proper level of encryption.
Important: Remember the passphrase if you choose to encrypt your file
contents. The archive file cannot be restored without the correct
passphrase.
See also
Restore (Application) on page 187
Backup and restore options on page 168
Back up a Security Each FactoryTalk Directory has a unique Security Authority identifier
generated during installation. Back up a Security Authority identifier to save
Authority identifier the identifier in case of disaster.
Secure controller projects and controllers running secure projects can only be
accessed when the FactoryTalk Directory Security Authority identifier
matches the identifier saved in the project. This prevents unauthorized access
to a controller or controller project if moved or copied to a different
FactoryTalk Directory.
Prerequisites
• Obtain the following permissions from System > System Policies>
User Rights Assignment:
• Modify Security Authority Identifier
See also
Restore a Security Authority identifier on page 176
Generate a Security Authority identifier on page 183
Modify Security Authority Identifier on page 169
See also
Back up an application on page 163
Backup and restore options Use backup and restore options to select which data in the FactoryTalk
Directory should be backed up or restored.
Important: Restoring from the wrong type of backup archive can overwrite
existing data that affects all applications.
FactoryTalk Services Platform 6.10 applies a new encryption
algorithm to the backup file for enhanced security. Backups
created using FactoryTalk Services Platform 6.10 can only be
restored to host computers that are also running FactoryTalk
Services Platform 6.10 or later. Backups created using FactoryTalk
Services Platform 2.90 or later can be restored onto host
computers that are running FactoryTalk Services Platform 6.10.
See also
Back up a FactoryTalk Directory on page 160
Back up an application on page 163
Back up a System folder on page 162
Back up a Security Authority identifier on page 166
Backup on page 167
See also
Generate a Security Authority identifier on page 183
Back up a Security Authority identifier on page 166
See also
Restore a FactoryTalk Directory on page 170
Restore an application on page 174
Restore a System folder on page 172
Verify security settings after restoring a FactoryTalk system on page
177
Backup and restore options on page 168
Restore a FactoryTalk To move an entire FactoryTalk system from one computer to another, restore
a FactoryTalk Directory backup archive. As a safeguard, create a backup
Directory archive of the directory first, before performing a restore operation.
Prerequisites
1. Obtain the security permissions needed to perform backup and restore
operations. Open System > Policies > System Policies, and then
double-click User Rights Assignment.
2. Shut down all FactoryTalk software products, components, and
services, except FactoryTalk Administration Console and FactoryTalk
Help.
3. Log on to the directory to restore into, and create a backup archive of
the existing directory.
After you enter the correct passphrase, Restore shows the type of
archive and what applications are contained in the archive. The entire
FactoryTalk Directory will be restored, including all applications, all
user and computer accounts and groups, passwords, policy settings,
security settings, and the security authority identifier.
6. To restore the FactoryTalk Directory contained in the selected archive,
select Finish.
7. After restoring a FactoryTalk Directory, verify FactoryTalk security
settings, and perform any follow-up tasks, such as copying in
application configuration .xml files and updating passwords.
8. If hosting servers on different computers than those configured in the
restored directory, the following additional steps are required:
• Add the new computers into the FactoryTalk Directory.
• Change the server host computer names on the server property
pages.
• Restart the computers hosting FactoryTalk Linx and Tag Alarm and
Event Servers. This is necessary to ensure the alarm servers start up.
See also
Verify security settings after restoring a FactoryTalk system on page
177
Update security settings for the FactoryTalk Linx OPC UA Connector
on page 180
Add a computer on page 59
Back up a FactoryTalk Directory on page 160
Restore a System folder To overwrite the contents of the existing System folder with the contents in
the backup archive, restore an archive that contains only a System folder.
A System folder archive includes the following:
• The list of user, computer, and group accounts
• Action groups
• Passwords
• Policy settings
Prerequisites
1. Obtain the security permissions needed to perform backup and restore
operations. Open System > Policies > System Policies, and then
double-click User Rights Assignment.
2. Create the system-only backup archive.
3. Shut down all FactoryTalk software products, components, and
services, except FactoryTalk Administration Console and FactoryTalk
Help.
4. Log on to the directory you want to restore into, and create a backup
archive of the existing directory.
Important: Do not restore an archive file created under FactoryTalk Services
Platform 2.10 (CPR 9) or later into a FactoryTalk Directory that is
currently running FactoryTalk Services Platform 2.00 (CPR 7). This
restore scenario is not supported and may have unexpected
results.
An archive file created using FactoryTalk Services Platform 6.10
cannot be restored on a computer running an earlier version of
FactoryTalk Services Platform.
Archive files created using FactoryTalk Services Platform 2.90 or
later can be restored on a computer running FactoryTalk Services
Platform 6.10.
See also
Verify security settings after restoring a FactoryTalk system on page
177
Backup and restore options on page 168
Back up a System folder on page 162
Prerequisites
1. Obtain the security permissions needed to perform backup and restore
operations. Open System > Policies > System Policies, and then
double-click User Rights Assignment.
2. Create the application archive, with or without a System folder.
To restore an application
1. In FactoryTalk Administration Console Explorer, right-click Network
or Local, and select Restore.
2. In Restore, select Browse, and then select the backup archive file
(ApplicationName.bak) to restore. Select OK, then select Next.
3. If the backup file is encrypted, Restore Backup File opens. Type the
passphrase that was used during the backup operation.
Important: An error message opens if the passphrase entered is not correct.
Enter the passphrase again. If the wrong passphrase is entered
three times, Restore Backup File closes. Select the archive file
and try again.
See also
Verify security settings after restoring a FactoryTalk system on page
177
Update security settings for the FactoryTalk Linx OPC UA Connector
on page 180
Back up an application on page 163
Restore a FactoryTalk system on page 170
Restore a Security Each FactoryTalk Directory has a unique Security Authority identifier
generated during installation. Restore a Security Authority identifier to
Authority identifier replace the current identifier with an identifier from a backup file.
Secure controller projects and controllers running secure projects can only be
accessed when the FactoryTalk Directory Security Authority identifier
matches the identifier saved in the project. This prevents unauthorized access
to a controller or controller project if moved or copied to a different
FactoryTalk Directory.
Important: After restoring a new Security Authority identifier, controllers and
controller projects secured with the previous identifier cannot be
accessed.
Prerequisites
1. Obtain the following permissions from System > System Policies>
User Rights Assignment:
See also
Back up a Security Authority identifier on page 166
Generate a Security Authority identifier on page 183
Modify Security Authority Identifier on page 169
Verify security settings After restoring a FactoryTalk Directory backup archive, verify the FactoryTalk
Directory security settings on the new FactoryTalk system meet your
after restoring a requirements, and make adjustments as needed.
FactoryTalk system Depending upon your FactoryTalk configuration, do one or more of the
following tasks after restoring the FactoryTalk Directory:
• Update computer accounts in the network directory
• Recreate Windows-linked user accounts
• Update Windows-linked user groups
• Update security settings for Networks and Devices
• Update security settings for FactoryTalk Linx OPC UA Connector
• Restore database connections
See also
Update computer accounts in the network directory on page 178
Recreate a Windows-linked user account on page 179
Update Windows-linked user groups on page 179
Update security settings for Networks and Devices on page 180
Restore database connections on page 181
Update computer accounts After restoring any backup archive that includes a System folder, update
computer accounts to allow access to the network directory.
in the network directory
If the system policy Require computer accounts for all client machines is
enabled, then only client computers that have been added to the list of
computers in the network directory can access that directory. When a backup
archive is restored, the directory automatically adds the computer on which
the network directory server resides, and the client computer from which the
restore operation was performed, to the System folder in the network
directory.
See also
Edit or view computer properties on page 61
Delete a computer on page 60
Add a computer on page 59
Verify security settings after restoring a FactoryTalk system on page
177
Recreate a Windows-linked When using individual Windows-linked user accounts, recreate these
accounts when restoring your FactoryTalk Directory to a new FactoryTalk
user account system.
Important: Only Windows-linked user group accounts move to a new domain,
individual Windows-linked user accounts do not move. This allows
you to retain all of the security permissions for the group.
Prerequisites
• Restore the FactoryTalk Directory on the run-time network.
• Complete any follow-up tasks needed to recreate the development
FactoryTalk Directory on the run-time network.
See also
Update Windows-linked user groups on page 179
Delete a user account on page 48
Add a Windows-linked user account on page 45
Add accounts to a FactoryTalk user group on page 56
Verify security settings after restoring a FactoryTalk system on page
177
Update Windows-linked When the System folder is restored to a new Windows domain, Windows-
linked user groups that existed in the original domain may no longer exist in
user groups the new domain.
Change the original Windows-linked groups to groups that exist in the new
domain. Security settings that refer to the Windows-linked groups in the new
See also
Update security settings for Networks and Devices on page 180
Update security settings for After restoring an entire FactoryTalk Directory, update security settings for
Networks and Devices to secure them in the new domain.
Networks and Devices
The Networks and Devices tree displays information about the networks and
devices connected to the local computer. The contents of the Networks and
Devices tree are not included in the backup archive, however the backup
archive does include any security settings defined for networks and devices.
If an archive is restored on a computer connected to the same networks and
devices using the same drivers or logical names, the security settings restored
from the archive file take effect. Check to make sure security settings are
accurate for the resources in the new FactoryTalk system, and make edits as
needed.
See also
Restore database connections on page 181
Verify security settings after restoring a FactoryTalk system on page
177
Update security settings for After restoring an entire FactoryTalk Directory on a replacement or re-
imaged computer, update security settings for the FactoryTalk Linx OPC
the FactoryTalk Linx OPC Connector if the OPC UA Server requires authentication. The user credentials
UA Connector for the OPC UA Server are encrypted and tied to the private key of the original
computer, so replacing the computer removes the stored credentials.
See also
Restore database connections on page 181
Verify security settings after restoring a FactoryTalk system on page
177
Restore database If the FactoryTalk system being restored includes Microsoft SQL Server
databases for logging historical data, including FactoryTalk Alarms and
connections Events logs, the connection to the database must be restored to re-establish a
connection between a database definition, held in the directory, and its
associated Microsoft SQL Server database.
See also
Verify security settings after restoring a FactoryTalk system on page
177
Restore a FactoryTalk system on page 170
Restore an earlier system An archive file created using FactoryTalk Services Platform 6.10 cannot be
restored on a computer running an earlier version of FactoryTalk Services
after upgrading FactoryTalk Platform. You must use the archive file created before you installed
platform software FactoryTalk Services Platform 6.10 to revert to a previous version.
Before restoring to an earlier system, keep the following in mind:
• Following the instructions in this topic overwrites all data in the
FactoryTalk Directory and returns it to the state it was in before
upgraded. For example, any applications, security settings, or system
policies will be lost. If you want to keep any of this data, back up the
network directory and local directory now.
• When reverting from FactoryTalk Services Platform 2.10 (CPR 9) or
later to an earlier version of the platform, you must restore backup
archives for both the network directory and the local directory, even if
you plan to use only one of the directories.
• If you upgraded to FactoryTalk Services Platform version 2.10 (CPR 9)
or later, backups of the earlier version of the local directory and
network directory were automatically created. You can use those
backups to revert to an earlier version.
• Do not restore an archive file created with FactoryTalk Services
Platform 2.10 (CPR 9) or later into a FactoryTalk Directory that is
running FactoryTalk Services Platform 2.00 (CPR 7). This is not
supported and may have unexpected results.
• As part of re-installing an earlier version of FactoryTalk Services
Platform or FactoryTalk Automation Platform, you will need to enter
the FactoryTalk administrator user name and passwords that were
saved in the backup archive of the FactoryTalk Directory.
See also
Restore a FactoryTalk system on page 170
Generate a Security Each FactoryTalk Directory has a unique Security Authority identifier
generated during installation. Generate a Security Authority identifier to
Authority identifier change the Security Authority identifier assigned to the FactoryTalk
Directory.
Secure controller projects and controllers running secure projects can only be
accessed when the FactoryTalk Directory Security Authority identifier
matches the identifier saved in the project. This prevents unauthorized access
to a controller or controller project if moved or copied to a different
FactoryTalk Directory.
Important: After generating a new Security Authority identifier, controllers and
controller projects secured with the previous identifier cannot be
accessed.
Prerequisites
1. Obtain the following permissions from System > System Policies>
User Rights Assignment:
• Modify Security Authority Identifier
2. Back up the FactoryTalk Directory.
See also
Back up a Security Authority identifier on page 166
Restore a Security Authority identifier on page 176
Modify Security Authority Identifier on page 169
See also
Restore a FactoryTalk Directory on page 170
Restore a System folder on page 172
Restore an application on page 174
Verify security settings after restoring a FactoryTalk system on page
177
Directory) 1. In the Explorer window, verify that the applications located in the
directory that you are restoring into are not currently expanded or
being used by some other product or component.
2. Right-click Network or Local, and click Restore.
After selecting a FactoryTalk Directory archive to restore, verify the
restoration settings are correct to finish the restore operation. If this is not
the correct backup archive, select Cancel to exit or Back to select a different
archive file.
Backup files that are created automatically when upgrading to FactoryTalk
Services Platform 2.50 or later can only be restored on the same computer.
Setting Description
Archive name The name of the backup archive file to restore.
Archive type Identifies the type of information held within the backup archive file.
FactoryTalk Directory - Identifies an archive file that contains the contents of an entire directory,
including all applications and the System folder.
Important: Restoring the System folder overwrites all user and computer accounts and groups, passwords,
policy settings, and security settings for all applications in the FactoryTalk Directory.
Application(s) Lists the names of the applications held in the backup archive file. When you restore an entire directory, all
of the applications included in that directory are also restored.
Restore Only appears when an application is open in the FactoryTalk Directory, which prevents a full restore. If
hidden, the entire FactoryTalk Directory will be restored.
Select which portions of the FactoryTalk Directory to restore:
• Restore directory contents only
Restores applications, users, computers, groups, passwords, policies, and security settings. The security
authority identifier is not restored.
• Restore security authority identifier only
Only restores the security authority identifier. Applications, users, computers, groups, passwords,
policies, and security settings are not restored.
Back up your directory and remove the old bindings from all controllers and controller projects before
continuing. Backup the directory with the new identifier after the restore process is complete.
Tip: After restoring from a backup archive, manually back up and restore
project files and databases from other software products participating in
the FactoryTalk system, and check security settings and computer
accounts.
See also
Restore a FactoryTalk Directory on page 170
See also
Restore a System folder on page 172
Backup and restore options on page 168
Setting Description
Archive name The name of the backup archive file to be restored. By default, the archive name is
ApplicationName.bak file.
Archive type Identifies the type of information held within the backup archive file.
• Application and System - Identifies an archive file that contains both an application and
a System folder.
• Application - Identifies an archive file that contains only an application.
Application(s) The name of the application or applications held in the backup archive file.
Restore System If the backup archive file includes a System folder, this option is available.
• To restore the application and the System folder, select Restore System. Restoring the
System folder overwrites all user and computer accounts and groups, passwords, policy
settings, and security settings for all applications in the FactoryTalk Directory.
• To restore the application without restoring the System folder, clear Restore System.
Restoring the System folder overwrites all user and computer accounts and groups,
passwords, policy settings, and security settings for all applications in the FactoryTalk
Directory.
When restoring an application without its associated System folder to a different directory
or to a different computer, security permissions for FactoryTalk users and groups need to
be manually recreated in the restored application.
Restore into a new application named: Choose whether to overwrite an existing application or create a new application.
• To restore the contents of the backup archive file into an application with a new name,
select Restore into a New Application Named, then enter a unique name. When Finish
is selected, the system leaves the original application intact and restores the backup
archive as a new application in the directory. When both applications are the same, it
copies the archived application into the directory.
• To restore an existing application with its original name, clear Restore into a New
Application Named. When Finish is selected, the system confirms to overwrite the
existing application of the same name. Select Yes to restore the application.
See also
Restore an application on page 174
Restore Backup File Use Restore Backup File to enter the passphrase which was used during the
archive file backup operation. The archive file cannot be restored without the
correct passphrase.
The passphrase must meet the following requirements:
See also
Restore (FactoryTalk Directory) on page 185
Restore an application on page 174
Restore a System folder on page 172
Restore a Security Authority identifier on page 176
Configuration Wizard 1. On the computer where FactoryTalk Services Platform is installed, log
on to Windows with a user account that is a member of the local
Windows Administrators group.
2. Click Start > All Programs > Rockwell Software > FactoryTalk Tools >
FactoryTalk Directory Configuration Wizard.
FactoryTalk Directory products share a common address book, finding and
providing access to plant floor resources, such as data tags and graphic
displays.
Configuration of the FactoryTalk Directory is automatic during installation of
FactoryTalk Services Platform. Use FactoryTalk Directory Configuration
Wizard when circumstances require a manual configuration of FactoryTalk
Directory. The FactoryTalk Directory Configuration Wizard is for use by
FactoryTalk administrators.
Run the FactoryTalk Directory Configuration Wizard if:
• An error occurs while installing the FactoryTalk Services Platform, or a
message displays instructing to run the wizard manually.
• A valid FactoryTalk Administrator account could not be found for the
directory during an upgrade of an existing FactoryTalk Directory from
FactoryTalk® Automation Platform version 2.0.
• If FactoryTalk Services Platform was installed from a remote client
(such as Remote Desktop Services). The FactoryTalk Directory cannot
be configured from a remote client. The FactoryTalk Directory
Configuration Wizard must be run at the Windows console on the
computer.
• The FactoryTalk administrator account in the network directory or
local directory is not accessible. Running the wizard resets a locked
administrator account, or changes an expired password for the
See also
Select a FactoryTalk Directory to configure on page 190
Network directory and account access on page 191
Network directory and the FactoryTalk Directory Configuration
Wizard on page 192
Local directory and account access on page 192
Product support for network and local directories on page 194
Select a FactoryTalk The first step in configuring a FactoryTalk Directory is to select which
FactoryTalk directory to configure from the first page in the FactoryTalk
Directory to configure Directory Configuration Wizard.
See also
Enter an administrator user name and password on page 195
Reset an expired password on page 196
Network directory and the FactoryTalk Directory Configuration
Wizard on page 192
See also
Network directory and the FactoryTalk Directory Configuration
Wizard on page 192
Reset an expired password on page 196
Change Password (network) on page 197
Summary on page 198
Network directory and the Running the FactoryTalk Directory Configuration Wizard to reconfigure the
FactoryTalk network directory performs these operations:
FactoryTalk Directory
• Backs up the original directory.
Configuration Wizard The backup file is named NetworkInstall*.bak and is located in
C:\ProgramData\Rockwell\RNAServer\Backups. The location of the
backup files is also logged to FactoryTalk Diagnostics. View the
diagnostic log files using the FactoryTalk Diagnostics Viewer.
• Adds the Windows Administrators group to the FactoryTalk
Administrators group, if an error occurred while you were installing or
upgrading the FactoryTalk Services Platform on a computer for the
first time, or if a valid administrator account could not be found.
This means that any user account that is a member of the local
Windows Administrators group on any computer connected to the
network directory has administrative access to the directory.
• Updates policies in the directory and adds the $AnonymousLogon
account to the directory, if an error occurred while upgrading an
existing FactoryTalk Directory.
This account is given Common > Read and Common > List Children
access to the FactoryTalk Directory. This account is used when
FactoryTalk products require service access to the directory.
• Changes the password, if the password to a FactoryTalk account has
expired, and the account is a member of the FactoryTalk
Administrators group.
• Resets the account, if a FactoryTalk administrator account becomes
locked.
See also
Configure FactoryTalk Network Directory on page 191
Reset an expired password on page 196
Change Password (network) on page 197
Summary on page 198
See also
Select a FactoryTalk Directory to configure on page 190
Local directory and the FactoryTalk Directory Configuration Wizard
on page 193
Enter an administrator user name and password on page 195
Change Password (local) on page 196
Product support for network and local directories on page 194
Local directory and the Running the FactoryTalk Directory Configuration Wizard to reconfigure the
FactoryTalk local directory performs these operations:
FactoryTalk Directory
• Backs up the original directory.
Configuration Wizard The backup file is named LocalInstall*.bak, and is located in
C:\ProgramData\Rockwell\RNAServer\Backups. The location of the
backup files is also logged to FactoryTalk Diagnostics. Use FactoryTalk
Diagnostics Viewer to view the diagnostic log files.
• Adds the Windows Administrators group to the FactoryTalk
Administrators group if an error occurred while installing or
upgrading the FactoryTalk Services Platform on a computer for the
first time, or if a valid administrator account could not be found.
See also
Configure FactoryTalk Local Directory on page 192
Change Password (local) on page 196
Enter an administrator user name and password on page 195
Product support for network and local directories on page 194
FactoryTalk Directory Configuration Wizard
Product support for FactoryTalk® Directory allows products to share a common address book,
which finds and provides access to plant-floor resources, such as data tags
network and local and graphic displays.
directories The FactoryTalk® Services Platform includes two separate directories: a local
directory and a network directory.
• In a local directory, a Directory Server, all project information, and all
participating software products are located on a single computer. Local
applications cannot be shared across a network.
• A network directory organizes project information from multiple
FactoryTalk® products across multiple computers on a network.
Which directory to configure depends upon which software products are part
of the FactoryTalk system. The table below shows which products require a
See also
Select a FactoryTalk Directory to configure on page 190
Enter an administrator user Enter a Windows Administrator account user name and password. If the user
name and password are accepted, the directory is configured and the
name and password FactoryTalk Directory Configuration Wizard summary is displayed.
Prerequisites
1. If not already on the second page of the FactoryTalk Directory
Configuration Wizard, go to Rockwell Software > FactoryTalk Tools
> and open FactoryTalk Directory Configuration Wizard.
2. In FactoryTalk Directory Configuration Wizard, select the directory
you want to configure, and select Next.
See also
Select a FactoryTalk Directory to configure on page 190
Reset an expired password on page 196
Configure FactoryTalk Network Directory on page 191
Configure FactoryTalk Local Directory on page 192
Default passwords on page 199
Reset an expired password When using the FactoryTalk Directory Configuration Wizard, if the password
to the administrator account has expired, Change Password opens
automatically. It cannot be opened manually.
Tip: Alternatively, use FactoryTalk Administration Console or FactoryTalk View
Studio instead of the FactoryTalk Directory Configuration Wizard to
change an account password.
See also
Configure FactoryTalk Network Directory on page 191
Configure FactoryTalk Local Directory on page 192
Default passwords on page 199
Change Password (local) The Change Password window appears automatically if the FactoryTalk local
directory contains an administrator account with an expired password. There
is no way to make this window appear manually if there is no administrator
account with an expired password in the directory.
See also
Configure FactoryTalk Local Directory on page 192
Summary on page 198
Default passwords on page 199
Change Password When running the Configuration Wizard, if your administrator account has
an expired password, Change Password appears automatically. There is no
(network) way to make this window appear manually if there is no administrator
account with an expired password in the directory.
If no other user is available and you cannot remember the password to your
FactoryTalk administrator account, contact Rockwell Automation Technical
Support.
See also
Reset an expired password on page 196
Configure FactoryTalk Network Directory on page 191
Summary on page 198
Default passwords on page 199
See also
FactoryTalk Directory Configuration Wizard
Default passwords If you are trying to configure a directory but you are being prompted for a
password you don't have, this might be because you are upgrading from
FactoryTalk Automation Platform version 2.00.
In version 2.00, you had to create passwords for FactoryTalk administrator
accounts in both the network directory and the local directory.
See also
Enter an administrator user name and password on page 195
Reset an expired password on page 196
Upgrade FactoryTalk In a distributed FactoryTalk System, all computers must run the same
FactoryTalk Services Platform major release, referred to as Coordinated
Services Platform Product Release (CPR). While not required, Rockwell Automation also
recommends that all computers run the same FactoryTalk Services Platform
minor release and patch levels. For the latest compatibility information, refer
to the Product Compatibility and Download Center.
During the upgrade, the installer automatically:
• Creates a backup file for any FactoryTalk Directory already configured
on the computer.
• Updates existing Local Directory and Network Directories with
support for new product policies, system policies, and features.
• Leaves existing settings unchanged, including user and group
accounts, security settings, and policy settings.
Prerequisites
• Obtain the installation disc of a FactoryTalk-enabled product
or
• Obtain the standalone FactoryTalk Services Platform installation file
downloaded from the Rockwell Automation Product Compatibility and
Download Center.
See also
Product Compatibility and Download Center
Back up a FactoryTalk Directory on page 160
Restore a FactoryTalk Directory on page 170
Identify the installed Identify the installed FactoryTalk Services Platform version to determine if an
upgrade of FactoryTalk Services Platform is necessary.
FactoryTalk Services
Platform version
To identify the installed FactoryTalk Services Platform version
1. Open the Windows Control Panel.
2. Open Add or Remove Programs.
3. In the list of installed programs, FactoryTalk Services Platform
appears, with the version number shown beside it.
See also
Install FactoryTalk Web Services on page 203
Add an HTTPS site binding for FactoryTalk Web Services on page 204
Install FactoryTalk Web FactoryTalk Web Services is installed from any FactoryTalk-enabled product
CD that includes FactoryTalk Services Platform, version 2.10.02 (CPR 9
Services Service Release 2) or later. It is an optional component and is not installed
automatically with FactoryTalk Services Platform.
For most applications, install FactoryTalk Web Services on the computer that
is the FactoryTalk Network Directory server. Specific FactoryTalk-enabled
products using FactoryTalk Web Services might also have additional
installation requirements. For details, see the documentation supplied with
your FactoryTalk-enabled product.
See also
Add an HTTPS site binding for FactoryTalk Web Services on page 204
Add an HTTPS site binding If deploying FactoryTalk Web Services in an environment where privacy of
the network communications might be at risk, add an HTTPS site binding to
for FactoryTalk Web encrypt all client connections to FactoryTalk Web Services.
Services
Prerequisites
• Install FactoryTalk Web Services.
• Configure Internet Information Services (IIS) to use web server
security.
See also
Microsoft TechNet: Configure Web Server Security (IIS 7)
See also
FactoryTalk communications
How to change the TCP port for IIS services
FactoryTalk Web Services • User account does not have permission to log into FactoryTalk Web
Services
1. On the FactoryTalk Web Services host computer, open a browser
and connect to the login URL. Replace the port number with the
port number configured in Internet Information Services (IIS)
Manager:
HTTP:
http://localhost:80/FactoryTalk/Security/WebService/200810.asmx
HTTPS:
https://localhost:443/FactoryTalk/Security/WebService/200810.asm
x
2. Select Login.
3. In userName, enter the user name for an account already
configured in the FactoryTalk Network Directory.
4. In password, enter the password for the account.
5. In encryptionAlgorithm, type ClearText then click the Invoke
button.
If the page returns an XML string, the user account is valid for use
with FactoryTalk Web Services.
• User account has been disabled or locked in FactoryTalk Directory.
Contact the FactoryTalk administrator to verify account status.
See also
Client computers unable to connect to FactoryTalk Web Services on
page 205
FactoryTalk Policy Manager Use FactoryTalk® Policy Manager to configure, deploy, and view the system
communication security policies.
and FactoryTalk System
FactoryTalk Policy Manager divides the system security policy into different
Services components.
Use these components to design security models that control the permissions
and usage of devices within the system.
• Zones - Groups of devices.
• Devices - Computers, controllers, modules, HMI panels, and drives.
• Conduits - Communication routes between components.
FactoryTalk Policy Manager depends on FactoryTalk System Services for
certificate services, policy deployment, and authentication.
FactoryTalk System Services provides these services on the FactoryTalk
directory server:
• Authentication Service
Authenticates users and validates user resource requests. Validate user
credentials against the FactoryTalk Directory and FactoryTalk security
policy settings to obtain privileges associated with the user.
• Certificate Service
Issues and manages X.509v3 certificates for use within the FactoryTalk
system.
• Deployment Service
Translates the security policy model defined using FactoryTalk Policy
Manager to CIP configurations that are delivered to endpoints.
• Diagnostics Service
Makes FactoryTalk audit and diagnostic logs available as a web service.
• Policy Service
Used to build and manage CIP network trust models and define
security policy for the CIP endpoints.
FactoryTalk System Services provides the policy authority, certificate
authority, identity services, and deployment services required to enforce
See also
Navigating FactoryTalk Policy Manager on page 210
FactoryTalk Policy Manager planning on page 213
Install FactoryTalk System FactoryTalk Services Platform version 6.11.00 includes two optional
components that are used to manage CIP Security; FactoryTalk System
Services and FactoryTalk Service and FactoryTalk Policy Manager.
Policy Manager FactoryTalk Policy Manager is dependent upon FactoryTalk System Services
and both components must be installed together on the network directory
server.
See also
Log on to FactoryTalk Policy Manager on page 209
Log on to FactoryTalk Logging on to FactoryTalk Policy Manager checks the credentials of your user
account to determine the access to resources and the ability to make changes
Policy Manager to security policy.
See also
Start FactoryTalk System Services on page 209
Navigate FactoryTalk Policy FactoryTalk Policy Manager displays the different configurable items in a
security policy model. The FactoryTalk Policy Manager Title Bar displays the
Manager current status of the model being configured. Models that are "saved" are local
to the FactoryTalk Policy Manager database. Once they are deployed the
status is not shown. If you make a change to a deployed model, the "Saved"
status will display again until the changes made are deployed.
See also
FactoryTalk Policy Manager Global Settings on page 211
Global Settings • In the FactoryTalk Policy Manager navigation bar, select Global
Settings.
Use Global Settings to define the settings that are applied to all devices
contained in the model. FactoryTalk Policy Manager sends this information
along with your certificate information to identify the different components
and establish the trust relationships. We recommend completing the Global
Settings information before using the certificate authentication method.
This table describes the settings:
Property Descriptions
General
• Model Name The name of the security model managed by this instance of FactoryTalk Policy
Manager.
Certificate Settings
• Organization The name of your organization.
• City/Locality The legally registered location of your organization.
State/Province If applicable, the State or Province in which your organization is using the
certificate.
• Country The country in which your organization operates.
Port settings
• Enable DTLS timeout When selected, the DTLS session closes after the specified period of inactivity.
This option is checked by default.
• DTLS timeout Enter a value between 1 and 3600 seconds. The default value is 12 seconds.
If a device does not support the timeout functionality, a warning appears in the
Device Properties pane.
Security Eventing Settings
• Enable security eventing When selected, events from FactoryTalk Policy Manager and FactoryTalk System
using Syslog server Services are stored as Syslog messages and sent to the specified server for
storage using the specified protocol.
• Server Settings Use these settings to identify the location of the Syslog server.
IP Address. Select to identify the Syslog server by IP address.
Hostname Select to identify the Syslog server by DNS hostname.
Port number. Identify the communications port on the server to receive the Syslog messages.
Default port number is 514.
• Message Settings Specify which details to include in the event log message.
• Sequence ID - Uniquely identify the type and purpose of the message.
• Time quality (sync info, time zone accuracy) - Describes the system time
mechanism used by the message originator.
• Time resolutions Defines the level of precision used in the timestamp of the log messages.
• Seconds
• Milliseconds
• Microseconds
• Nanoseconds
Changes made to these settings are saved after pressing ENTER or selecting
another field.
See also
Authentication methods on page 215
FactoryTalk Policy Manager component considerations on page 214
FactoryTalk Policy Manager planning on page 213
FactoryTalk Policy Manager Implementing a CIP Security policy requires preparation and planning before
deployment. At a minimum, gather this information:
planning
• Number of zones.
• Security requirements for each zone.
• Devices assigned to each zone.
• Required trust relationships:
• Zones and devices
• Devices to devices
• IP Addresses of all devices to be included in the policy.
This diagram depicts a simple deployment consisting of three zones
• The PC Zone which contains mobile devices, servers, and
administrative computers.
• Zone 1 which contains a switch, controller system, and administrative
computer.
• Zone 2 which contains a switch, monitoring panel, controller system,
programming system, and maintenance computer.
• The PC Zone is connected to both plant zones by separate conduits
Item Description
Items with a lock are CIP Security capable.
Items with a list are not CIP Security capable and are trusted by their IP address.
Conduits connect the security zones enable secure communication between devices in different
zones.
The zone are represented by different blocks. Each device within the block trusts the other devices
in the block and can communicate with devices in zones that are connected by conduits.
See also
Zones on page 216
Conduits on page 217
Devices on page 219
FactoryTalk Policy Manager When designing a security model using FactoryTalk Policy Manager consider
these items.
component considerations
• Devices.
Identify which devices are included in the security model.
• Conduits.
Identifies the communication pathways in the security model.
Determine whether the pathways are zone-to-zone, zone-to-device, or
device-to-device.
• Zones.
Identifies a group of logical or physical devices to which security
settings are applied.
Devices within a zone trust each other.
• Pre-shared keys (PSK).
A key based on a shared secret that is provided to devices to establish
trust.
• Certificates.
Used to establish a devices identity by providing information about
ownership of a public key.
• Security options
When a certificate is used as the authentication method additional
security checks are available to be used with messaging and I/O data.
• Integrity Only
Checks whether data was altered and whether the data was sent by a
trusted entity. Altered and/or untrusted data is rejected.
• Integrity & Confidentiality
Checks integrity and encrypts the data so the corresponding
decryption key is required to read the data. Rejects altered and/or
untrusted data.
• Devices that cannot support CIP Security.
Some devices do not support CIP Security and cannot authenticate
themselves to the system. Decide how these devices will be included in
the system. There are two approaches:
• Use a CIP Proxy device. A CIP Proxy device can be placed in front of
the non-CIP securable device. The CIP Proxy device controls the
See also
Zones on page 216
Conduits on page 217
Devices on page 219
See also
Zone properties
Conduit properties
Device properties
Security Groups FactoryTalk Services Platform includes these built-in security groups that are
used to define rights and privileges for users.
The controls available in FactoryTalk Policy Manager reflect the user rights
granted to the logged in user account.
Tip: If you are logged on using an Administrator account but FactoryTalk Policy Manager is only
permitting viewing of devices, zones, and conduits, verify that the FactoryTalk Directory services
are running and that the computer is connected to the FactoryTalk Directory.
See also
Read-only mode
Devices on page 219
Deployment
Zones Zones are security policy groups to which devices are assigned. Once a device
is assigned to a zone, the device uses the policy default settings of that zone.
Zones establish the rules for data integrity, data privacy, and the
authentication method used to authenticate trusted devices. When
configuring a zone, use the CIP Security Communication settings within the
zone properties to establish these controls:
• Authentication method
• I/O data security
• Messaging security
• Port usage
See also
Add a zone on page 217
Edit zone properties
Add a zone Add zones to establish areas of security policy. Devices assigned to the zone
trust each other. Edit the zone properties to enable CIP Security and
configure the related settings. CIP Security is not enabled by default.
To add a zone
1. In the FactoryTalk Policy Manager navigation bar, select Zones.
2. On the toolbar next to ZONES, select Add [+].
Adds a new zone to the list with these default values:
• Name - Zone #
• Description - None
• Enable CIP Security - Not selected by default.
Select to enable configuration of CIP Security related settings.
See also
Zone properties
Edit zone properties
Delete a zone
See also
Add a conduit on page 218
Edit conduit properties
Delete a conduit
Conduit properties
Add a conduit Add a conduit to connect two endpoints. Endpoints can be either a device or a
zone.
Conduits must adhere to these rules:
• Each combination of endpoints must be unique.
• Duplicate conduits are not permitted.
• One of the endpoints must be CIP Security capable.
• If one endpoint is a zone, the other endpoint cannot be a device within
that zone.
To add a conduit
1. In the FactoryTalk Policy Manager navigation bar, select Conduits.
2. On the toolbar, select Add [+].
CONDUIT PROPERTIES pane opens.
3. In Endpoint 1, next to Select an endpoint select Browse for Endpoint
[...]. Select Endpoint opens.
4. Choose a zone or device to assign as the first endpoint of the conduit.
Tip: In Filter, type part of the name to list only endpoints that match that criteria.
See also
Conduit properties
Edit conduit properties
Delete a conduit
Devices Devices are the modules, drives, controllers, HMI panels, computers, CIP
Proxy devices, and servers that work together to create a FactoryTalk system.
Add devices that share security requirements and that should trust each other
to a zone. A device can have one or more ports that are added to the security
model. Devices can be added manually or discovered by querying the network
for devices.
Devices are connected to other devices or zones by conduits.
See also
Discover devices on page 219
Add a device to a zone on page 219
Add a device to the device list
Configure port properties
Remove the security policy from a device on page 223
Discovery Use Discovery to traverse your system and find devices. Devices found in
discovery can be added to the device list and assigned to zones. Discovery can
be useful for populating a list of devices or for checking that the devices added
to the list manually are accurately identified.
See also
Discovery pane
Discover devices
Navigate the Discovery pane
Perform a search from the Discovery pane
Add a device to a zone Add a device to a zone to include it in the FactoryTalk Policy Manager security
model. Alternatively, use discovery to find devices on the network.
To add a device
1. In the FactoryTalk Policy Manager navigation bar, select:
See also
Configure port properties
FactoryTalk Linx devices The CIP Security tab of the FactoryTalk Linx server workstation can be used
to view CIP security status and reset CIP security to clear CIP security
configuration.
These are the settings on the CIP Security tab of the Device Properties dialog
box.
Setting Description
CIP Security Configuration Shows the FactoryTalk Linx workstation CIP security configuration
status.
Configured
Means the FactoryTalk Linx workstation is configured to utilize CIP
security with FactoryTalk Policy Manager.
Factory Default / Disabled Settings
Means the FactoryTalk Linx workstation CIP security configuration has
been cleared. All security settings is now in Factory default mode (CIP
Security is disabled).
Reset CIP Security permission required.
Means the logged on user doesn't have the security permission to reset
CIP security configuration. Go to System > Policies > Product Policies
> FactoryTalk Linx > Feature Security to obtain the permission.
Reset CIP Security Click this button to clear CIP security configuration for the FactoryTalk
Linx workstation.
See also
Add a port on page 222
Configure port properties
Port properties
Add a port Generic devices can have ports added to them to match their configuration.
To add a port
1. In the FactoryTalk Policy Manager navigation bar, select Devices to
and then select a generic device from the FactoryTalk Policy Manager
device list.
2. In the PORT PROPERTIES pane, select the pencil icon next to the
device name to open the DEVICE PROPERTIES pane.
3. Under Ports select the plus [+] icon.
A new port adds to the Ports list.
4. Select the pencil icon next to the port number to configure port
properties, such as the port name, description, EtherNet driver, IP
address, and protocols used by the device.
See also
Configure port properties
Port properties
Replace a device Replacing a device is used when a device that has already been configured and
enabled for CIP Security has failed or needs to be rotated out for
maintenance. Device replacement enables the identity and the security
configuration of the previous device to be assigned to the replacement device.
The communications port on a device must be reset after replacement to
apply the security policy settings.
To replace a device
1. In the FactoryTalk Policy Manager navigation bar, select:
• Zones and then select a zone in the Zones table to replace a device
on the selected zone's device table.
• Devices to replace any device on the FactoryTalk Policy Manager
device list.
2. In the device table, select the name of the device to replace.
The selected device properties display in DEVICE PROPERTIES.
3. On the FactoryTalk Policy Manager toolbar, select Replace Device.
Deploy Configuration to Replace Device displays.
4. In Deploy Configuration to Replace Device choose when to reset the
communication ports on the device:
See also
Deployment results
Remove the security policy If the security model has been deployed and the device communications have
been reset the device is constrained by the security policy. Even if FactoryTalk
from a device Policy Manager and FactoryTalk System Services are uninstalled the security
policy configured for the device is still in effect.
Use these steps to remove the security policy if necessary.
See also
Edit device properties
Delete a device
Deploy a security model on page 224
Ranges If there are groups of devices that are not CIP Security capable, they can be
incorporated into the security model using a trusted IP range.
See also
Add a range on page 224
Authentication methods on page 215
Add a range Add a range to define a set of IP addresses to assign to a zone. A device range
is useful for devices that do not support CIP Security, but that need to be part
of the security policy model.
To add a range
1. In the FactoryTalk Policy Manager navigation bar, select:
• Zones and then select a zone in the Zones list to add a device range
to the selected zone's device list.
• Devices to add an unassigned device range to the FactoryTalk Policy
Manager device list.
2. On the toolbar, select Add Range. The RANGE PROPERTIES pane
opens.
3. In Name, type a name for the range.
4. (optional) In Description, type a description of the range.
5. In Start IP Address, type the first IP address in the range being
defined.
6. In End IP Address, type the last IP address in the range being defined.
7. (optional) In Zone, select the security zone to assign to this range. If
adding a range from within the Zone list, the range is automatically
assigned to the currently selected zone.
See also
Discovery on page 219
Add a zone on page 217
Range properties
Deploy a security model After the zones, conduits, and devices have been configured, the security
policy model can be deployed.
See also
Devices on page 219
Conduits on page 217
Zones on page 216
Deployment results
Backup and restore Create backup files to preserve and restore the security models for your
system in case of a systems failure.
security models
These are the considerations related to using backup and restore with
FactoryTalk Policy Manager:
• The FactoryTalk Policy Manager security model is stored by
FactoryTalk System Services in a policy database.
• Create a backup after a policy deployment to keep the backup files
synchronized with the current security policy.
See also
FactoryTalk System Services
Deploy a security model on page 224
Backup FactoryTalk System Backup FactoryTalk System Services to save copy of the the security model
and its associated certificates. After it has been created the FactoryTalk
Services System Services backup file is included with the FactoryTalk Services
Platform backup when it is performed.
See also
Backup and restore security models on page 226
Restore FactoryTalk System Services on page 227
Restore FactoryTalk Restore FactoryTalk System Services to return the FactoryTalk System
Services databases to a known good state.
System Services
IMPORTANT Restoring FactoryTalk System Services requires administrator privileges.
See also
Backup and restore security models on page 226
Index groups 20, 30, 32, 44, 45, 47, 48, 49, 50,
51, 52, 53, 63, 77, 125, 126, 127, 166, 168,
174
I
A inheritance 131, 149, 150
accounts 16, 17, 43, 44, 45, 47, 48, 49, 50, L
52, 53, 55, 74, 87
administrator 32, 37, 183, 186, 187, 188, list children 43, 44, 45, 47, 48, 49, 50, 51,
190, 191, 192 55, 56, 57, 63, 64, 65, 106, 119, 120, 126,
computer 88, 96, 166, 172, 173 127, 140, 141, 142, 186, 188
user 13, 20, 21, 27, 28, 29, 30, 32, 33, 41, local applications 19, 21, 189
43, 45
action groups 63, 64, 65, 131, 140, 141, 142, M
145, 147 multiple applications 15, 164
actions 20, 27, 30, 33, 63, 64, 65, 198
after restoring 164, 166, 168, 171, 172 N
allow and deny permissions 131, 150
application 13, 19, 27, 28, 30, 68, 69, 72, networks 30, 80, 115, 116, 117, 118, 119, 122,
74, 116, 119, 120, 125, 126 125, 126, 129, 131, 141, 142, 175
application authorization policy 68, 69
area 19, 20, 27, 30, 119, 120, 122, 125, 126, O
127, 131, 142, 149
order of precedence 32, 100, 135
audit policies 81, 86
authenticated users 188 P
B permissions 20, 21, 27, 28, 30, 32, 41, 44,
45, 47, 48, 49, 50, 51, 55, 56, 57, 63,
back up 64, 74, 75, 155, 158, 161, 164
64, 65, 74, 75, 81, 106, 109, 110, 115, 116,
best practices 32 117, 118, 119, 120, 122, 125, 126, 127, 131,
135, 140, 141, 142, 145, 147, 149, 150,
C
158, 161, 166, 168, 171, 174, 175, 178
chain of inheritance 131, 149 policies 13, 20, 21, 27, 28, 29, 33, 55, 67,
client computer 21, 35, 37, 55, 86, 88, 96, 68, 74, 75, 77, 80, 81, 82, 86, 87, 88, 93,
100, 105, 173, 195 94, 96, 100, 104, 105, 106, 109, 110, 131,
common actions 131 158, 161, 166, 168, 171, 174, 177, 178, 186,
computer account 30, 55, 56, 57, 88, 96, 188, 190, 191, 192, 195
166, 172, 173 ports 200
D R
devices 13, 20, 30, 78, 116, 117, 118, 119, 122, read 27, 30, 131, 135, 141, 142, 149, 150, 186,
125, 126, 129, 131, 140, 141, 142, 175 188
rename 173
E resource groups 122, 125, 126, 127, 129,
131, 141, 142, 155
effective permissions 131, 150
S
security authority identifier 74, 75, 161,
164, 165, 166, 171, 178
server 13, 15, 19, 21, 30, 35, 37, 38, 55, 69,
74, 75, 78, 80, 88, 96, 100, 104, 105, 131,
135, 140, 141, 142, 155, 166, 173, 175, 185,
189, 195, 197, 198
single sign-on 37, 86, 88, 93, 94, 96, 104,
105
stand-alone system 15, 21, 28
system folder 13, 30, 74, 75, 131, 155, 158,
164, 165, 166, 168, 173, 174
T
tag actions 15, 140, 141, 142, 183, 189
test 77, 150
tighten security 28, 29
troubleshoot 77, 81
U
upgrade 78, 166, 177, 183, 185, 187, 193,
195, 196
user rights assignment 74, 75, 158, 161,
166, 168, 171, 178
W
write 20, 27, 30, 44, 45, 50, 51, 56, 57, 59,
63, 64, 65, 82, 131, 140, 141, 142, 145
Literature Library Find installation instructions, manuals, brochures, and technical data publications. rok.auto/literature
Product Compatibility and Download Center Get help determining how products interact, check features and capabilities, and rok.auto/pcdc
(PCDC) find associated firmware.
Documentation feedback
Your comments help us serve your documentation needs better. If you have any suggestions on how to improve our content, complete the form at
rok.auto/docfeedback.
Rockwell Automation maintains current product environmental information on its website at rok.auto/pec.
Allen-Bradley, expanding human possibility, Logix, Rockwell Automation, and Rockwell Software are trademarks of Rockwell Automation, Inc.
Trademarks not belonging to Rockwell Automation are property of their respective companies.
Rockwell Otomayson Ticaret A.Ş. Kar Plaza İş Merkezi E Blok Kat:6 34752, İçerenkÖy, İstanbul, Tel: +90 (216) 5698400 EEE YÖnetmeliğine Uygundur