How to Implement Runtime Security Measures Based on PLC Tag Values in the ME System.

Question:

Our facility is implementing a RFID database to manage access control for our equipment. I am looking to implement runtime security measures that restrict access levels based on PLC tag values. Are there any features in the ME system that can facilitate this process?

Top Replies

In the process of establishing a RIFD database for our facility to manage access to equipment, we are seeking a method to implement runtime security based on PLC tag values. Is there a feature within FactoryTalk View ME that can facilitate this requirement? While it may not be achievable directly from the PLC, valuable insights can be found in the discussion linked below. We have a PLC equipped with an RFID card reader which can detect different authorization levels such as operator (level 2), technician (level 4), maintenance staff (level 6), and engineer (level 12). Explore more on this topic at www.plctalk.net.

Definitely, the Manufacturing Execution Systems (ME systems) do have features that support runtime security measures such as access control. For instance, based on PLC tag values, you can assign different access levels to different users on your equipment by leveraging MES's granular role-based access control (RBAC). Additionally, using custom scripts triggered by specific PLC tag changes could also further automate this process. To enable these features, you might need to dive deep into the system’s documentation or possibly get in touch with software technical support for guidance. Also, remember to first test any configuration changes in a controlled environment before applying onto production.

Absolutely, the ME system has User Services and User Manager option where you can regulate user access as per your needs. You can define access levels based on PLC tag values, so you end up giving people access only to what they need for their roles. On top of that, you can create 'Event Scripts' with conditions based on PLC tags to trigger any specific actions as required. This provides a very dynamic and encompassing control over your equipment accessibility.

Absolutely, the ME system does have features to facilitate this process and ensure better control. You might want to look into the Security Services component of the ME system. It has user roles and areas that can be defined to limit access to certain PLC tag values. You can also enable recipe security, which restricts users from making unauthorized changes. Just remember to cross-reference this with your RFID system to maintain consistent access levels.

More Replies β†’

Streamline Your Asset Management
See How Oxmaint Works!!

βœ…   Work Order Management

βœ…   Asset Tracking

βœ…   Preventive Maintenance

βœ…   Inspection Report

We have received your information. We will share Schedule Demo details on your Mail Id.

To add a comment, please sign in or register if you haven't already..   

Frequently Asked Questions (FAQ)

FAQ: FAQs:

Answer: 1. How can I implement runtime security measures based on PLC tag values in the ME system? - You can achieve this by leveraging features such as conditional expressions and access control settings within the ME system.

FAQ: 2. Is it possible to integrate a RFID database with the ME system for access control management?

Answer: - Yes, you can integrate a RFID database with the ME system to manage access control for equipment.

FAQ: 3. Are there any specific guidelines or best practices for implementing security measures based on PLC tag values?

Answer: - It is recommended to carefully define access levels, establish clear conditional rules, and regularly review and update security measures to ensure effectiveness.

FAQ: 4. Can the runtime security measures be customized to suit our specific access control requirements?

Answer: - Yes, the ME system typically offers flexibility for customization, allowing you to tailor security measures to meet the unique needs of your facility.

Ready to Simplify Maintenance?

Join hundreds of satisfied customers who have transformed their maintenance processes.
Sign up today and start optimizing your workflow.

Request Demo  β†’