Sei sulla pagina 1di 7

12 InFusion Galactic

Security Lab
Introduction
Security of the galaxy is a complex objective. Too much security and the plant
will not be able to operate correctly, not enough security and anyone can do any
action to the plant. This lab will get the service representative familiarize with
enabling a galactic security model for a small plant. In this plant we will have
operators, instrument technicians as well as engineers. We will setup security for
a group of users who each have different assignments in the plant.
nce this security is created we will deploy a pre!created strategy that has each
of these security options. Then we will log into In"usion view and test the newly
created security. #fter the security has been verified we will view the security files
on the hard drive, $S S%& database files.
Enabling Objective
This lab will show the service engineer how to implement a customers In"usion
Security model.
This lab will enable the service engineer to enter a loc'ed (alaxy )epository
Lab Objectives:
Students will be able to #dd users in (alaxy Security $odel
Students will develop a (alaxy Security $odel
Students will deploy Security $odel
Students will test security features by changing users in S$*, I+,, and
InTouch
Students will be able to chec' files and +atabases to chec' security
settings
Students will be shown how to disable administrators security word to
access a loc'ed down galaxy
Documents: (Found on InSQL CD)
Wonderware "actorySuite #- +eployment (uide
INFUSION SECURITY LAB
1) This Step is only done on the Server Station: Load Security_lab directory onto each
station. Import a exported called Security_Stratigy.aq!" #irections
a) Copy the Security folder from CD to D:\
b) From the IDE select Galaxy, Import, Automatio !b"ects
c) #a$i%ate to D:\Security&'ab ad select State%y&Security(a)*+G
d) Cha%e Import *refereces to S,ip as sho- belo-, ad select !+
e) *ut the Compoud Called Security from the .assi%ed folder ito C*F.SE(
$) %evie& Security settings o' security_lab strategy
a) /erify Security optios for the S*0 of each of the follo-i% *ID bloc,s
b) *ID1 S*0 is &&&&&&&&&&&&&&&&&&&&
c) *ID2 S*0 is &&&&&&&&&&&&&&&&&&&&
d) *ID3 S*0 is &&&&&&&&&&&&&&&&&&&&
e) *ID4 S*0 is &&&&&&&&&&&&&&&&&&&&
f) *ID5 S*0 is &&&&&&&&&&&&&&&&&&&&
%) *ID6 S*0 is &&&&&&&&&&&&&&&&&&&&
() )nable *rchestr* +"alaxy security)
a) !pe the IDE, Select "alaxy, ,on'igure, Security
b) /ery commo to %et the follo-i% messa%e:
c) #eed to fid the 0emplates7Istaces that are chec,ed out( 0-o -ays to do this try to
fid the chec,ed out ob"ect i the IDE or %o ito 8S S9' SE:/E: S0.DI! ad fid
the chec,ed out ob"ect( I this lab -e are %oi% to use the latter due to this bei% the most
useful i a lar%e G:
a( !pe the 8icrosoft S9' Ser$er 8aa%emet Studio, lo%i as sa- pass-ord
*rchestr*, .der the File there is a pic, for .e& /uery- select this tab may
ha$e to lo% bac, i to ru a )uery, type the )uery listed belo-
b( 0he output should loo, as follo-s:
c( Chec, i the ob"ects by a$i%ati% to the /ie-, i the abo$e example this is the
#et-or, /ie- do to -hat bei% chec,ed out bei% hard-are( !ce the chec, is
foud ri%ht clic, the ob"ect ad select 0ndo ,hec1 2ut
d( Cotiue util all ob"ects i the list ha$e bee chec,ed i
e( #o- %o bac, to step 3a i eteri% security
d) ;y default the security is #oe, -e -ill select "alaxy the Security %oles tab
e) From Security Groups tab select the plus si% to add a Security Group, ame the %roup
SEC.:I0<, select default security %roup ad dra% the compoud amed SEC.:I0<
cotaii% the Strata%y&Security ito the SEC.:I0< G:!.*
f) Select the :oles 0ab, Add the follo-i% :oles file follo-i% permissios
%ole .ame Security %ole I#) S3, Level
IA&Coif% Ac,, Coif% All All =>>
IA&0ue Ac,, 0ue Some !pe oly ?>>
IA&!perate Ac,, !per !pe oly !pe oly @>>
IA&/ie- Ac, !pe oly !pe oly 6>>
Default Ac, !pe oly !pe oly >
Some for IDE is, !pe, Geeral Cofi%uratio, System Cofi%uratio, Applicatio
Cofi%uratio
%) Select the .ser 0ab, Add the follo-i% .sers, *ass-ords ad tie to listed roles
0ser ass&ord I#) S3, %oles
0om tom !pe !pe IA&!perate
#ichole ichole !pe !pe IA&!perate
;ob bob All All Admi, IA&0ue
Au%o hu%o All All IA&/ie-
Bua "ua All All Admi, IA&Cofi%
Default #o *ass-d !pe !pe #o other
Admiistrator #o *ass-d All All #o other
h) Select !+
i) 'o% bac, ito the %alaxy
") Ay Compouds7 Strate%ies are dirty deploy these ob"ects a%ai
,) Exit the IDE
4) This section can be done on 5oth Stations6 5ring #isplay into 7indo& 3a1er
a) Import Display Security
b) 0ry Display, If coects to bloc,s %o to Step 5(
i) !pe Display Security
ii) Select all of the /ertical Sliders, C0:'CC D0his copies ito buffer)
iii) Close Display Security
i$) !pe Display E&0E8*'A0ES&FullSiFe
$) *aste the /ertical Sliders ito this display as C0:'C/
$i) Delete Security Display
$ii) :i%ht clic, o E&0E8*'A0ES&FullSiFe ad Sa$e as SEC.:I0<
$iii) 8iimiFe Gido-8a,er
8) Test Security 7arning 5ug 7ith Select #one 2pen these I#s in Select to do this test
a) 'o% ito IFusio/ie- as Bua
b) !pe display Security
c) 0est Each Slider
d) Ghat *IDs should Bua ha$e access toH&&&&&&&&&&&&&&&&&&&&&
e) 'o% ito IFusio/ie- as ;ob
f) 0est Each Slider
%) Ghat *IDs should ;ob ha$e access toH&&&&&&&&&&&&&&&&&&&&&&
h) 'o% ito IFusio/ie- as Au%o
i) 0est Each Slider
") Ghat *IDs should Au%o ha$e access toH&&&&&&&&&&&&&&&&&&&&&&
,) 'o% ito IFusio/ie- as 0om
l) 0est Each Slider
m) Ghat *IDs should 0om ha$e access toH&&&&&&&&&&&&&&&&&&&&&&&
) ! /alidate I2 -hose ame did you eed to useH&&&&&&&&&&&&&&&
o) Ghy did you eed to use someoe else -ith !perator *ermit iosH&&&&&&&&&&&&&

Potrebbero piacerti anche