6.8.4 Security
Last updated
Last updated
Introduction
This setup page provides some extensions to security settings.
Description
1) Object lock
Set a bit address to lock the object. When the object is locked, it could not be operated and an icon of the lock is displayed. If user doesn't want to display the lock icon, please check [Hide "Lock" icon]. In the default mode, when the control address is OFF, the object is locked, when it is ON, the object is unlocked. If the opposite logic is required, please check [Lock when ON]
Gray display: If this object is locked, text would be grayed out
2) Confirmation
When object is operated, there is a prompt to confirm it. The waiting time is used for setting the time of the prompt, the unit is second, and the range is 0-65535 (integer). For example: Set the waiting time to 3 seconds. When the user clicks on object, a confirmation prompt will pop up. If no confirmation, the prompt will automatically disappear after 3 seconds, and operation is not executed.
3) Touch function
Touch available: the object is touchable when selected.
Beep: the object is beeping when selected. The object is beeping when selected.
4) Triggering
There are six modes for it
No trigger: The object could not be triggered;
Trigger before press: Set the read address after the first data input.
Trigger after press: Set the read address after data input.
Trigger and reset after press: Reset the read address after data input.
Trigger and reset before press: Reset the read address after data input.
Trigger before press, reset after: Set the read address ON while input the data, reset after pressing [ENTER]
5) User Permission
Enable User permission: Users can set user permission levels for operating objects, only operators with operational privileges are allowed to operate on certain functions. The user log information is used for recording the operation of objects and those records are displayed in object. The user log information can be up to 64 bytes.
Access Denied Setting Users can set enable password for object. There are following operating setting when user permissions are insufficient. But [Pop login screen] and [Hide object] are mutually exclusive.
Every time: Userlogin screen will pop-up when user permissions are insufficient;
When change user: Userlogin screen will pop-up when user permissions, and if users logged in successfully, the previous users will log out.
Pop once: userlogin screen will pop-up when user permissions are insufficient, but when user enter the right password, this object can be operated by anyone.
Hide object: When user permissions are insufficient, this object is hidden.
6) Enable object password
It could only be used if the object password is enabled in project settings and configured.
Object level: It is used for setting this object password level.
Becomes the lowest level when enabled: Users need to type password every time while operating this object .
7) Hide
Control bit: Display or hide the bit switch by designated address state.
Hide mode: There are two modes; Object could not be operated if it is hidden.
Hide when OFF;
Hide when ON;
Invisible: object keeps hiding during project running.