InfinityClientSecurity – System intended to manage access rights of client applications
General Functions
- Administration of access rights, authorization and authentication of users in distributed systems.
- System monitoring and management.
Features
- Configuring user rights for working with SCADA Infinity client applications from the list of applications, application functions and time intervals.
- Setting rights for user groups.
- Integration with the MS Windows accounts database.
- Using the cluster scheme for user groups.
General Information
InfinityClientSecurity is a SCADA Infinity component designed to manage user access rights to resources and system components: administration of access rights, authorization and authentication.
The security of SCADA Infinity is based on Microsoft solutions used in the security subsystem of the Windows family operating systems. SCADA Infinity users are Windows OS users, that allows to use the single entry mechanism for identification data when users enter the system.
To identify users, standard authentication protocols are used: Kerberos, NTLM, enabling the use of alternative third-party software-technical means of authentication, such as smart cards, biometric devices and others integrated with the Windows security subsystem.
Easy to Set up Access Rights and Time Periods
- Configuring user rights for working with client applications SCADA Infinity is possible according to the list of applications, application functions and time intervals.
- Visual administration and user access rights management tools
allow you to easily configure access rights and time intervals for
each user, and for monitoring rights and auditing access to the
following protected resources of the process control system:
- operational values of process parameters (reading, writing),
- operative reports on accidents and deviations during the technological process (reading, acknowledgment),
- history of changing parameter values and occurrence of alarm messages during the process (reading, adding, changing, deleting),
- mnemonic schemes (reading, adding, modifying, deleting),
- technological servers configuration data (reading, changing),
- technological servers configuration and administration functions (execution).
Security Management and Monitoring
Visibility of Access Audit Data
- Convenient means of viewing the audit log, providing the ability to search and filter audit data.