Symphony Splus Scada Engineering - 2.3 - User - Management - User - Manual
Symphony Splus Scada Engineering - 2.3 - User - Management - User - Manual
INDUSTRIAL AUTOMATION
Disposing of this product correctly will help save valuable resources and prevent any potential negative
effects on human health and the environment, which could otherwise arise from inappropriate waste
handling.
TABLE OF CONTENTS
1. Introduction.................................................................................................... 1-3
1.1 Technical Overview .............................................................................................1-3
1.2 Intended User ......................................................................................................1-3
1.3 User Manual Content ..........................................................................................1-3
1.4 Glossary of Terms and Abbreviations...............................................................1-3
1.5 Reference Documents ........................................................................................1-5
2VAA003209-230 A 1
TABLE OF CONTENTS
2 2VAA003209-230 A
LIST OF TABLES
LIST OF TABLES
2VAA003209-230 A 3
LIST OF TABLES
4 2VAA003209-230 A
LIST OF FIGURES
LIST OF FIGURES
2VAA003209-230 A 5
LIST OF FIGURES
6 2VAA003209-230 A
LIST OF FIGURES
LIST OF FIGURES
2VAA003209-230 A 7
LIST OF FIGURES
8 2VAA003209-230 A
LIST OF FIGURES
LIST OF FIGURES
2VAA003209-230 A 9
LIST OF FIGURES
10 2VAA003209-230 A
Preface
This document provides information about how to install and operate the User Management in Symphony Plus, as part of
the Symphony Plus Engineering software.
This functionality is used in S+ Engineering software.
About This Book
General
This manual describes the User Management feature and how to work with Accounts in the Symphony Plus Engineering.
The User Management in Symphony Plus is a module that is used to create and manage users and assign user roles to
users in a Symphony Plus system. The assigned user roles define the privileges given to a user.
Document Conventions
Microsoft Windows conventions are normally used for the standard presentation of material when entering text, key
sequences, prompts, messages, menu items, screen elements, etc.
Document Icons
This publication includes Information, Caution and Tip where appropriate to point out important information or useful hints
to the reader. The corresponding symbols should be interpreted as follows:
Electrical Warning icon: It indicates the presence of a hazard that could result in electrical shock.
Warning icon: It indicates the presence of a hazard that could result in a plant shutdown
or personal injury.
Caution icon: It indicates the presence of a hazard that could result in corruption of software or
damage to equipment/property.
Tip icon: It indicates advice on, for example, how to design project or how to use a certain function.
NOTE The Note statement highlights important information pertaining to a particular descriptive text (for example: 'Module
description', 'Installation', 'Configuration', or 'Operational procedure', etc.) in the document.
Although Warning hazards are related to personal injury, and Caution hazards are associated with equipment or property
damage, it must be understood that operation of damaged equipment could, under certain operational conditions, result in
degraded process performance leading to personal injury or death. Therefore, fully comply with all Warning and Caution
notices.
2VAA003209-230 A 1
About This Book
2 2VAA003209-230 A
Introduction Technical Overview
1. Introduction
This document contains the description of how to work with the user management functions in ABB Symphony Plus.
Introduction
Explains the overview of the online help and its intended user.
Term Definition
IP Internet Protocol
AD Active Directory
WG Workgroup
2VAA003209-230 A 1-3
Reference Documents Introduction
Term Definition
WB Workbench
UM User Management
PA Project Admin
Number Document
8VZZ002960T2300 S+ Operations 2.3 Operations engineering user manual
1-4 2VAA003209-230 A
Active Directory and Workgroup Configuration Active Directory Installation
2. Click the Add roles and features option in the Server Manager window.
The Add Roles and Features Wizard window open as shown in Figure 2-2.
3. Select Role-based or feature-based installation in the Select installation type window as shown in the following fig-
ure.
2VAA003209-230 A 2-1
Active Directory Installation Active Directory and Workgroup Configuration
4. Click Next.
The Select destination server window opens as shown in the following figure.
2-2 2VAA003209-230 A
Active Directory and Workgroup Configuration Active Directory Installation
5. Click Next.
The Select server roles window opens as shown in Figure 2-4.
6. Select Active Directory Domain Services from the list of Roles as shown in the following figure.
2VAA003209-230 A 2-3
Active Directory Installation Active Directory and Workgroup Configuration
An Add Roles and Features Wizard dialog box open as shown in the following figure.
2-4 2VAA003209-230 A
Active Directory and Workgroup Configuration Active Directory Installation
2VAA003209-230 A 2-5
Active Directory Installation Active Directory and Workgroup Configuration
8. Click Next.
The Select features window open as shown in the following figure.
2-6 2VAA003209-230 A
Active Directory and Workgroup Configuration Active Directory Installation
9. Click Next.
The Active Directory Domain Services window opens as shown in the following figure.
2VAA003209-230 A 2-7
Active Directory Installation Active Directory and Workgroup Configuration
10.Click Next.
The Confirm installation selections window opens as shown in the following figure.
2-8 2VAA003209-230 A
Active Directory and Workgroup Configuration Active Directory Installation
11.Click Install.
2VAA003209-230 A 2-9
Active Directory Installation Active Directory and Workgroup Configuration
Once the Installation is complete the Installation Results window appears as shown in the following figure.
After the Installation. The system requires a Reboot, select reboot to complete the installation.
After
Once the system restarts, follow the following steps to install the Active Directory:
13.Click on Windows and select Server Manager.
The Server Manager window opens as shown in the following figure.
2-10 2VAA003209-230 A
Active Directory and Workgroup Configuration Active Directory Installation
14.Click on the notification symbol. The notification opens as shown in Figure 2-11.
15.In the notification message click on the link Promote this sever to a domain controller.
The Deployment Configuration window opens as shown in the following figure.
2VAA003209-230 A 2-11
Active Directory Installation Active Directory and Workgroup Configuration
16.Select the option Add a new forest under the Select the deployment operation.
17.In the Root domain name text box enter the root domain name (for example Engineering.abb.com), and click Next.
The Domain Controller Options window opens as shown in the following figure.
2-12 2VAA003209-230 A
Active Directory and Workgroup Configuration Active Directory Installation
2VAA003209-230 A 2-13
Active Directory Installation Active Directory and Workgroup Configuration
19.Click Next.
The additional options window opens as shown in the following figure.
2-14 2VAA003209-230 A
Active Directory and Workgroup Configuration Active Directory Installation
20.Click Next.
The Paths window opens as shown in the following figure.
2VAA003209-230 A 2-15
Active Directory Installation Active Directory and Workgroup Configuration
21.Click Next.
The Review Options window opens as shown in the following figure.
2-16 2VAA003209-230 A
Active Directory and Workgroup Configuration Active Directory Installation
22.Click Next.
The Prerequisites Check window opens as shown in the following figure.
2VAA003209-230 A 2-17
Active Directory Installation Active Directory and Workgroup Configuration
23.Click Install.
The Installation begins as shown in the following figure.
2-18 2VAA003209-230 A
Active Directory and Workgroup Configuration Active Directory Installation
2VAA003209-230 A 2-19
Configuring Redundant Domain Controller Active Directory and Workgroup Configuration
After the server reboot, the Active directory option is visible in the tools menu as shown in the following figure.
2-20 2VAA003209-230 A
Active Directory and Workgroup Configuration Configuring Redundant Domain Controller
2. In the Deploy Configuration window select Add a domain controller to existing domain options as shown in the
following figure to configure the redundant domain controllers.
3. In the Domain text box, specify the existing domain name (i.e., Engineering.abb.com).
4. Click Select to specify the domain information.
The Windows Security dialog box opens as shown in the following figure.
5. Enter the user name and password of administrator (the primary domain controller).
6. Click OK.
7. Click Next.
2VAA003209-230 A 2-21
Configuring Redundant Domain Controller Active Directory and Workgroup Configuration
The Domain Controller Options window opens as shown in the following figure.
2-22 2VAA003209-230 A
Active Directory and Workgroup Configuration Configuring Redundant Domain Controller
9. Click Next.
The Additional Options window opens as shown in the following figure.
10.Select the domain Controller from the Replicate from dropdown list.
11.Click Next.
The Paths window opens as shown in the following figure.
2VAA003209-230 A 2-23
Configuring Redundant Domain Controller Active Directory and Workgroup Configuration
12.Click Next.
The Review Options window opens as shown in the following figure.
2-24 2VAA003209-230 A
Active Directory and Workgroup Configuration Configuring Redundant Domain Controller
13.Click Next.
The Prerequisites Check window opens as shown in the following figure.
2VAA003209-230 A 2-25
Configuring Redundant Domain Controller Active Directory and Workgroup Configuration
14.Click Install.
The Installation begins as shown in the following figure.
2-26 2VAA003209-230 A
Active Directory and Workgroup Configuration Configuring Child Domain Controller
2VAA003209-230 A 2-27
Active Directory Settings for Workbench Active Directory and Workgroup Configuration
1. Click on Windows and select Server Manager, then follow the steps from section Active Directory Installation
Step 1 through Step 15.
2. Enter the mandatory value as shown as in the above figure and Click Next.
3. Follow the steps 7 -14 from Active Directory and Workgroup Configuration
2-28 2VAA003209-230 A
Active Directory and Workgroup Configuration Active Directory Settings for Workbench
2. In the S+ Engineering application select, System> Server Configuration as shown in the Figure 2-31.
It is recommended not to use abb.com in the domain name as it is registered to ABB not for internal
purposes.
The domain name should be always the same as the Domain under which the machine is present.
2VAA003209-230 A 2-29
Active Directory Settings for Workbench (Read-only Domain) Active Directory and Workgroup Configuration
2-30 2VAA003209-230 A
Active Directory and Workgroup Configuration Active Directory Settings for Workbench (Read-only Domain)
2. In the S+ Engineering application, select System menu> Server Configurations as shown in the following figure.
2VAA003209-230 A 2-31
Active Directory Settings for Workbench (Read-only Domain) Active Directory and Workgroup Configuration
5. Click Next > Provide password and select the required check box.
6. Click Next > Finish to create new user.
NOTE: User Management prevents the creation of a user with a hyphen in the user name due to database restriction.
Only the following characters are supported in the User Management :
• Numeric
• Alphanumeric
• (_, @,#)
Follow the steps to create new group manually in Domain:
1. In the Start menu of domain controller machine, Click Windows Administrative Tools > Click Active Directory
Users and Computers.
2. In the Active Directory Users and computers window, click Domain.
3. Click Builtin from the drop-down and select Create New Group icon
2-32 2VAA003209-230 A
Active Directory and Workgroup Configuration Active Directory Settings for Workbench (Read-only Domain)
2VAA003209-230 A 2-33
Active Directory Settings for Workbench (Read-only Domain) Active Directory and Workgroup Configuration
2-34 2VAA003209-230 A
Active Directory and Workgroup Configuration Active Directory Settings for Workbench (Read-only Domain)
NOTE: For assigning project to a user, the user should have minimum SPUser role.
NOTE: All the users should have minimum SPUser role for to access the Database.
2VAA003209-230 A 2-35
Workgroup Configuration Active Directory and Workgroup Configuration
If a new user is added in Domain, refresh User management to add the user in Database (Refer to figure).
2-36 2VAA003209-230 A
Active Directory and Workgroup Configuration Workgroup Configuration
2VAA003209-230 A 2-37
Workgroup Configuration Active Directory and Workgroup Configuration
7. Click OK.
8. Restart the system.
Check whether the S+ node is in the intended workgroup.
Note: The workgroup would be configured with the workgroup name specified (For example, SPLUS) as shown
in the following figure.
2-38 2VAA003209-230 A
Active Directory and Workgroup Configuration Workgroup Settings for Workbench
6. Click OK.
2VAA003209-230 A 2-39
System Network Configuration Active Directory and Workgroup Configuration
2-40 2VAA003209-230 A
S+ Operations Security Concept Introduction
2VAA003209-230 A 3-1
Configuring Users S+ Operations Security Concept
The following figure (Figure 3-1) explains the different type of associations possible:
The Figure 3-1 shows an example of Windows user Operator1 associated with the Symphony Plus Windows user group
SPlusOUsers, which will grant general permissions needed to work as an operator with Symphony Plus. Additionally
Operator1 is associated with SPlusOOperators and Operator1 is also associated with a S+ Operations Windows Group that
is associated with special in application user right of S+ Operations. The identification is the Windows user group name.
The diagram below Figure 3-2 explains the association to S+ Operations security group in more details:
3-2 2VAA003209-230 A
S+ Operations Security Concept S+ Operations Application specific privilege
The associate takes place in the Windows user group field where all users that are in the referenced group will be
associated with this security settings.
Ensure that the Active user is set to No, Yes will make this configuration invalid.
NOTES:
• While each User can be assigned to as many Windows user groups, only one particular S+ Operations user group
is possible. In case of a misconfiguration when multiple groups are selecting the one with the lowest index will be
used. If this function is required the "Role" feature of S+ Operations can be used.
• Ensure that S+ Operations user group (For example: SPlusOOperators) is not associated with any other group
members, else the user may gain access from the associated group member if exists. The S+ Operations user
group SPlusOOperators and SPlusOGuests are user defined and not defined by the script. Hence the Windows
user (For example: OPerUser) must be a member of SPlusOOperators, SPlusOUsers, and SPlusIMEventReader.
2VAA003209-230 A 3-3
Security Levels S+ Operations Security Concept
3-4 2VAA003209-230 A
S+ Operations Security Concept Tag Operations and Privileges
2VAA003209-230 A 3-5
Tag Operations and Privileges S+ Operations Security Concept
Privileges
Different privileges defined here applies at system levels. These privileges control more generic functions and access to
utilities. Some examples of privileges are shown below:
For more information, refer to Security parameters section in S+ Operations User Manual (8VZZ000206T3300).
The following are the examples of the different functions:
Tags Security
For a user to access tags in S+ Operations Server, the required privileges are Security level, Security Group, and Tag
Operations plays an important role.
To View Tags following conditions must satisfy:
Tag Security Level <= User Security Level
AND
Tag Security Group In User Security Groups (set to YES)
For User to be able to configure a Tag additionally following condition must satisfy:
Under Tags Operations: Tag Configure = YES
Under Privileges: Configuration = YES and View Configuration = YES
3-6 2VAA003209-230 A
S+ Operations Security Concept Tag Operations and Privileges
Displays Security
Displays can be viewed by a User if:
Display Security Level <= User Security Level
AND
Display Security Group In User Security Groups (set to YES)
Similar to other Database items, Display's security level and groups are defined within Display Builder for every graphics
page under, Display header page as shown below:
Figure 3-6: Display builder with security level and Security group
2VAA003209-230 A 3-7
Specific Historian user groups S+ Operations Security Concept
The permissions given are individually by signal and not by signal group: in the same group there can be signals that have
read access only, few among them have read/write access and others that have configuration access (see above).
3-8 2VAA003209-230 A
S+ Operations Security Concept Configuring History Rights in S+ Operations
Each historian signal group is assigned to a matching windows group name (SPlusIMGroup0 - SPlusIMGroup8). Some
groups have predefined functions such as:
• User Group 0 always has access to all signal of the S+ Operations historian server. This group is also called the
administrator group. This group can always read, write and configure a signal.
• User Group 1 is used as a Guest group. This group has no signals by default. Typically users have very limited
access to signals and only read operation is possible.
• User Group 3 is used for standard operator or office users. By default signals are in read operation assigned to this
group.
All other groups have no preassigned role and can be freely used for any kind of operation.
A Windows user can only be part of one group - if a user is configured to be in multiple groups, then the permissions
granted will not be deterministic.
Conceptually the configuration should follow a user profile represented by a particular history group and then this group
must be associated with a particular user.
Signals are generated by the TagSync windows service. Signals permissions can be changed and maintained in the
Symphony Plus realtime database at any time. For more information, refer also to the extra chapter on configuration with
Symphony Plus.
Historian
Windows Group Names Function
Group ID
0 SPlusOAdmins Administrator group, can read, write and
SPlusIMGroup0 configure. All Signals are in this group by
default for read, write and configure
2VAA003209-230 A 3-9
Configuring History Rights in S+ Operations S+ Operations Security Concept
A specific right for a specific signal can be assigned to a user group, or it can be removed. Such an assignment may only be
performed by the historian system administrator (SysAdmin).
For each of the signals, the rights are stored in the database under the property Real Time Summary (RTS). The storage is
done in a bit pattern.
Thus, for each signal the rights can arbitrarily be set for each of the groups.
• 1 (high) in the bit pattern means that the right has been assigned to the group.
• 0 (low) in the bit pattern means that the right has not been assigned to the group.
The property "RTS", for example, is displayed as a character string in the Signal Explorer. In this representation, each of the
three bytes (read/write/config) is displayed by a two-digit hexadecimal number.
Thus the signal with the property RTS = "0F0705" has the following rights:
3-10 2VAA003209-230 A
S+ Operations Security Concept Setting Groups, Users, and Service Security
The following figure shows an example of the allocation of the bit pattern the user groups and rights:
OR SPlusOAdmins
Create an account called SPlusIMEventReader
HSIServiceUser SPlusScanner
Administrators
2VAA003209-230 A 3-11
Setting Groups, Users, and Service Security S+ Operations Security Concept
SQL Server Agent SQLServerAgentUser Executes jobs, monitors SQL Only in Windows User group
Server, fires alerts, and allows
automation of some
administrative tasks.
Reference table for user specific permissions on the file system, see table below:
RX %PUBLIC%\Historian
Example: %PUBLIC% is C:\Users\Public
F %SYSTEMPATH%\History\PlantConnect.SY
S\Temp
F %SYSTEMPATH%\History\<NavigatorPath>
F %SYSTEMPATH%\History\History\PlantConn
ect.SYS\Debug
RW %SYSTEMPATH%\History\PlantConnect.SY
S\Texte
RW %SYSTEMPATH%\History\PlantConnect.BIN
\Updates
F %SYSTEMPATH%\History\PlantConnect.SY
S\WebServer
RW %programdata%\ABB Symphony
Plus\Operations
Example: %programdata% is
C:\ProgramData
SPlusOAdmins F %SYSTEMPATH%
Example: C:\Program Files (x86)\ABB
Symphony Plus\Operations
F %PUBLIC%\Historian
SPlusIMReportUser F %SYSTEMPATH%\PlantConnect.SYS\Report
Scheduler
DRMW %SYSTEMPATH%\PlantConnect.BIN\Report
Scheduler
DRMW %SYSTEMPATH%\History\PlantConnect.SY
S\Debug
DRMW %SYSTEMPATH%\History\PlantConnect.BIN
\Addins
3-12 2VAA003209-230 A
S+ Operations Security Concept Service security configuration for operation engineering
DRW %SYSTEMPATH%\History\PlantConnect.SY
S\Events
DRMW %SYSTEMPATH%\History\PlantConnect.SY
S\Debug
SPlusOServiceUser W %SYSTEMPATH%\History\PlantConnect.BIN
\Server
DRW %SYSTEMPATH%\History\PlantConnect.SY
S\Events
DRMW %SYSTEMPATH%\History\PlantConnect.SY
S\Debug
DRXW %SYSTEMPATH%\History\PlantConnect.BIN
\PwTagSync
RX %SYSTEMPATH%\History\PlantConnect.BIN
\PCCounter
DRXMW %SYSTEMPATH%\History\PlantConnect.BIN
DRW %SYSTEMPATH%\History\PlantConnect.SY
S\PCCounter
F <RohPath>
<MMMPath>
SQLServerUser F <DefaultDBPath>
SPlusIMScanner RW %SYSTEMPATH%\PlantConnect.SYS\SysKo
nfi\Scanner
RW %SYSTEMPATH%\PlantConnect.BIN\Scann
er
2VAA003209-230 A 3-13
Setting the Security Policy S+ Operations Security Concept
2. Navigate to Security Settings > Local Policies > User Rights Assignments
For systems in Domain environment, configure the user rights assignment security policies on the domain controller node in
the following location as given in the Table 3 1: Users and groups configuration:
1. Go to Control Panel > Administrative Tools > Group Policy Management.
3-14 2VAA003209-230 A
S+ Operations Security Concept Setting the Security Policy
3. Navigate to Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies.
4. Click User Rights Assignments.
Add users/groups to the policies as given in the following table.
Log on as a SPlusIMServiceUser
batch job
Log on as a SPlusIMReportUser
service SPlusIMServiceUser
SQLServerAgentUser
SQLServerUser
Impersonate a SQLServerUser
client after SPlusIMServiceUser
authentication
2VAA003209-230 A 3-15
Setting the Security Policies for the Local Users S+ Operations Security Concept
2. The user with limited privileges (that is without Administrators or SPlusOAdmins groups) cannot start S+
Operations using the Start Operations icon.
NOTE: The unique way to start the system is to reboot the machine.
3. The Windows Administrator account must be disabled.
3-16 2VAA003209-230 A
S+ Operations Security Concept On all S+ Operations Nodes
4. Go to Local Group Policy Editor > Computer Configuration > Windows Settings > Security Settings > Local
Policies > User Rights Assignment, then add the Users in the HSI Services to the Deny logon locally and Deny
log on through Remote Desktop Services as shown in the following figure:
Figure 3-15: Deny logon locally and Deny log on through Remote Desktop Services
2VAA003209-230 A 3-17
On S+ Operations Server S+ Operations Security Concept
6. Join the domain as shown in the following Figure 3-16 and then reboot the system.
3-18 2VAA003209-230 A
S+ Operations Security Concept Access to the local server homepage
The following figure displays the list of users in Operations Engineering > Database Settings > Users (Figure 3-17).
2VAA003209-230 A 3-19
Access to the local server homepage S+ Operations Security Concept
6. A Login - New window opens, in General page, select Windows authentication and click Search as shown in
the following figure.
7. A Select User or Group dialog box is displayed, click Object types as shown in the following figure.
8. In Object Types dialog box, select Groups and then click OK as shown in the following figure.
9. Enter SPlusIMEventReader and validate input by selecting the Check Names option as shown Figure 3-22.
10. Click OK.
3-20 2VAA003209-230 A
S+ Operations Security Concept Access to the local server homepage
11. In the Login - New window, Click Server roles page and select Public as shown in Figure 3-23.
A new guideline is created for validating members of the AD (Active Directory) group SPlusIMEventReader in
the SQL Server as shown in the following figure.
2VAA003209-230 A 3-21
Access to the local server homepage S+ Operations Security Concept
2. Right-click on Users, a context menu is displayed, select New User as shown in the following figure
(Figure 3-25).
3. A Database User - New window opens, in General page, type the user name in the Username field
(for example: SPlusIMEventReader) as shown in the following figure (Figure 3-26).
3-22 2VAA003209-230 A
S+ Operations Security Concept Access to the local server homepage
5. In Select Login window, click Object Types to browse for related objects as shown in the following figure
(Figure 3-27).
6. In Browse for Objects window, select the AD (Active Directory) (for example: SPlusIMEventReader) as shown
in the following figure (Figure 3-28).
7. Click OK.
2VAA003209-230 A 3-23
Access to the local server homepage S+ Operations Security Concept
8. Under the Database User - New window, in Database role membership scroll box, select db_datareader to
assign the role to the user as shown in the following figure (Figure 3-29).
This configuration allows users from the group SPlusIMEventReader connect to the SQL server and to read
records from the database PlaCoEvents.
3-24 2VAA003209-230 A
S+ Operations Security Concept Access to the local server homepage
4. A Select User or Group window opens, click Object Types as shown in the following figure
(Figure 3-31).
5. In the Object Types window, select Groups and then click OK as shown in the following figure (Figure 3-32).
6. In the Object Name field, type Domain Admins and then click Check Names.
7. After validation of the Object Name, click OK.
2VAA003209-230 A 3-25
On S+ Operations Application Severs S+ Operations Security Concept
8. In the Login-New window, select Server Roles page and select sysadmin as shown in the following figure
(Figure 3-34).
3-26 2VAA003209-230 A
S+ Operations Security Concept Configuring Users in Workgroup Environment
For folder C:\Program Files (x86)\ABB Symphony Plus set permission as full control for the IIS_IUSRS group as shown
in below figure (Figure 3-35).
2VAA003209-230 A 3-27
Configuring Users in Workgroup Environment S+ Operations Security Concept
2. Right-click on Logins, a context menu is displayed, select New Login as shown in the following figure
(Figure 3-30)
3-28 2VAA003209-230 A
S+ Operations Security Concept Configuring Users in Workgroup Environment
5. In the Object Types window, select Groups and then click OK as shown in the following figure (Figure 3-32).
6. In the Object Name field, type Administrators and then click Check Names.
7. After validation of the Object Name, click OK.
2VAA003209-230 A 3-29
Configuring Users in Workgroup Environment S+ Operations Security Concept
8. In the Login-New window, select Server Roles page and select sysadmin as shown in the following figure
(Figure 3-34).
3-30 2VAA003209-230 A
Working with User Management
For managing users, to one should login as Active Directory administrator or local administrator.
2. To Open User Management, provide the Domain or local administrator password in Windows security prompt win-
dow
2VAA003209-230 A 4-1
Ribbon Bar Options Working with User Management
4-2 2VAA003209-230 A
Working with User Management Symphony Plus User Roles
The following table (Table 4-1) lists the buttons and corresponding functional description of the Permissions tab.
Buttons Description
2VAA003209-230 A 4-3
Symphony Plus User Roles Working with User Management
4-4 2VAA003209-230 A
Working with User Management Symphony Plus User Roles
2VAA003209-230 A 4-5
Symphony Plus User Roles Working with User Management
4-6 2VAA003209-230 A
Working with User Management Add User
NOTE: Only the following characters are supported in the User Management for User creation:
• Numeric
• Alphanumeric
• (_, -, @,#)
• Not contain the user’s account name or parts of the user’ full name that exceed two consecutive characters
• Be at least six characters in length
• Contain characters from three of the following four categories:
– English uppercase characters (A through Z.)
– English lowercase characters (a through z).
– Base 10 digits (0 through 9).
– Non alphabetic characters (for example,!, $, #,%).
When the password does not meet the password complexity, an error message appears.
2VAA003209-230 A 4-7
Edit User Working with User Management
5. Click OK.
The user is created and the roles are defined.
The user name, project name, and the role that is selected, is displayed on the status bar.
When users switch between the modules or features, the defined role is automatically changed and displayed on
the status bar.
For installations the engineering user also requires local admin rights. For this, user needs to be added to the local
Administrators group on the Workbench client machine.
For an administrative privileged user, and unable to create a user in User Management, ensure to follow the
Registry settings.
For S+ Engineering and 800xA nodes, NetBIOS configuration settings must be set to default value for Plant
Network adapter to perform User Management actions successfully.
4-8 2VAA003209-230 A
Working with User Management Delete User
The User ID, First Name, Last Name and Description fields are now editable as shown in the following figure.
2VAA003209-230 A 4-9
Delete User Working with User Management
1. Click Delete User in the ribbon bar as shown in the following figure.
A User Management message box opens with the message “Do you want to delete selected user(s)?”.
2. Click Yes.
The user is deleted and a “User deleted successfully” message is displayed in the Messages Pane.
Follow the steps to delete multiple user at a time:
1. Select the users from the Users List as shown in the following figure.
4-10 2VAA003209-230 A
Working with User Management Export Users
2. Click Yes.
The users gets deleted and a “User deleted successfully” message is displayed in the Messages Pane.
To perform delete option, ensure the selected user(s) is/are inactive in all the client machines of the same
workgroup.
When a user is deleted, in case of Active Directory, User will be deleted from Active Directory domain.
When a user is deleted, in case of Workgroup, User will be deleted from each machine of the Workgroup.
2VAA003209-230 A 4-11
Import Users Working with User Management
4-12 2VAA003209-230 A
Working with User Management Import Users
Following are the steps to import the user details form an excel sheet:
1. Click the Import to import the users with their roles and associated project details.
2VAA003209-230 A 4-13
Import Users Working with User Management
User should have the SPSystemAdmin role to Import and Export users.
NOTES:
1. User name and password must meet windows password complexity requirement.
2. Password imported through excel sheet will not be set, so after importing users list, user need to log on and set
a new password. Then in User Management, edit the particular users and uncheck “User must change password
at next logon” and check “Password never expires” option.
4-14 2VAA003209-230 A
Working with User Management Sync Users
2VAA003209-230 A 4-15
Assign a Project to the User Working with User Management
The project is created using the Project Admin tool. Refer to Section 3.1 Creating a Project of in S+ Engineering 2.3 Project
Administration user manual (8VZZ000130T). Once the project is created, it will be listed in the Available Projects list box of
the Project Mapping tab in the UM application as shown in the following figure.
4-16 2VAA003209-230 A
Working with User Management Assign a Project to the User
The selected project is moved to the Assigned Project field as shown in the following figure.
Note: Users can also drag and drop the project from the Available project list to the assigned project to assign a
project to a user.
6. Click Apply.
A User Management message box opens with the message “Project mapping done successfully” as shown in
the following figure.
2VAA003209-230 A 4-17
Unassign a Project Working with User Management
6. Click Yes.
All the projects that are assigned to the user is removed from the Assigned Project list.
NOTE: Operation roles and engineering roles will appear only after the project is open.
Select the user from the list of users for which roles need to be added.
4-18 2VAA003209-230 A
Working with User Management Assign Roles
1. Click Assign Roles in the ribbon bar as shown in the following figure.
The selected user gets activated, more roles can also be added to the user.
1. Select the roles from the S+ Roles list.
2. Click “>>” button.
The selected roles move to the Assigned Roles list box.
Note: Users can also Drag and drop the roles to assign the roles to the user.
A Tool tip with its description appears when mouse-hover any user role.
While assigning Operations roles to a user, only one role apart from SPlusOUsers role can be
assigned. The roles can be any one of the following:
– SplusOAdmins
– SPlusOGuests
– SPlusOOperators
– SPlusOEngineers
– SPlusOSupervisors.
Users can assign the Historian and web portal roles.
3. Click Apply.
The additional roles added will be updated.
In Case of Active Directory User, editing the roles will update in the Active Directory domain.
In case of Workgroup User, editing the roles will update in each machine of the Workgroup.
NOTE: Refer User Roles in Symphony Plus section for more information on role based access.
2VAA003209-230 A 4-19
Operations Working with User Management
4.12 Operations
Once the user is created, two operation roles can be assigned to a user.
Once the user is created and project assigned, click Application Engineering > Operations Engineering and import user
and user roles.
Once the user and user roles are imported, the template user in the Operations tab of User Management interface can be
seen.
The Operations tab contains the following options as shown in the Figure 4-26:
User Name: The name of the User created.
Description: The job description of the user that is described while creating user.
S+ Role: the Operations role assigned to the user.
Template: A pre-defined set of privileges assigned to the operation’s user. The operation’s user is as imported in
Operations Engineering.
User Role: The user roles as imported in HMI Configuration.
To configure the operations tab, follow the steps:
1. Select Application Engineering > Operations Engineering.
2. Click Database Settings tab, in Operations Engineering window.
3. Expand the Database tree, click Users.
4-20 2VAA003209-230 A
Working with User Management Operations
4. In the Files to Import option, click on the “...” (browse) button to select the file.
5. Click Import.
The user details (Index, Name and Description) are imported as shown in the following figure.
2VAA003209-230 A 4-21
Operations Working with User Management
7. In the Files to Import option, click on the “...” browse button to select the file.
8. Click Import.
The user details (Index, Name and Description) are imported as shown in the following figure.
Once the Users and User Roles settings done. Open the Operations tab in the User Management tool.
The users and roles data will be mapped to the operations database.
4-22 2VAA003209-230 A
Working with User Management Operations
9. Click the button on the right side of the Template option as shown in the following figure.
For creating a new user template, select “Create a new template” from the drop-down menu:
10.Click the Create New Template button on the right side of the Template option as shown in the following figure
The Template user interface window opens as shown in the following figure
2VAA003209-230 A 4-23
Operations Working with User Management
4-24 2VAA003209-230 A
Working with User Management Operations
Validate the user and its roles assigned in Operations tab as shown below”
Figure 4-35: Newly added operations user and user roles template confirmation
2VAA003209-230 A 4-25
Action Role Mapping Working with User Management
4-26 2VAA003209-230 A
Working with User Management Action Role Mapping
The rest of the tabs in the spreadsheet lists all the S+ Engineering components and the details about actions versus role
mapping.
NOTE: The spreadsheet is for user reference only. Any change or modifications made in the sheet will not have any
effect on the roles or actions which are predefined and not user configurable.
2VAA003209-230 A 4-27
Action Role Mapping Working with User Management
4-28 2VAA003209-230 A
Setting up system to run under low privileged users
2VAA003209-230 A 5-1
Setting up system to run under low privileged users
4. Click OK.
5-2 2VAA003209-230 A
Setting up system to run under low privileged users Providing access to the folder
2VAA003209-230 A 5-3
DCOM Settings Setting up system to run under low privileged users
My Computer settings
Managing the settings for the general computer access, users and permissions
1. Goto Windows > Run, type "DCOMCNFG" on the text area and click Enter to open the Component Services
window.
2. Under: Component Services'Computers, Right-click on My Computer and Choose the Properties from the
menu.
3. Click the Default Properties Tab and configure as follow:
4. Enable Distributed COM on this computer checked.
– Default Authentication Level Connect
– Default Impersonation Level Identify
5-4 2VAA003209-230 A
Setting up system to run under low privileged users OPC Server Settings
2VAA003209-230 A 5-5
OPC Server Settings Setting up system to run under low privileged users
Configure as required for the Launch and Activation Permissions, provide permissions to the users and/or groups who
should be able to access the COM service in this machine, setting the permissions. To assign permissions to a special
group or user, add it and check the desired boxes.
1. Click Edit Limits button in the Launch and activation Permissions window.
2. Click Add, enter users accounts and/or groups required (ex: SPlusOServiceUser ).
3. Click OK.
4. Check the desired allow or deny boxes.
5-6 2VAA003209-230 A
Setting up system to run under low privileged users OPC Server Settings
5. Click OK
OpcEnum Settings
This settings is to manage the users/groups that must be able to see the existing OPC servers running on the machine (It is
possible to give authorization to many users/groups to see the existing OPC servers running but authorize different
users/groups to access to different servers.
1. Goto Windows > Run, type DCOMCNFG on the text area and click Enter to open the Component Services
window.
2. Right-click on My Computer and Choose the Properties from the menu.
3. In General tab, confirm for the Authentication Level connect. is chosen from the drop-down list
2VAA003209-230 A 5-7
Server settings Setting up system to run under low privileged users
4. In Security tab, on the Launch and Activation Permissions window, Click Customize > Edit button.Manage
permissions.
5. Click OK.
6. For "Access Permissions", click Customize > Edit button.
7. Manage permissions and click OK
8. The Configuration Permissions is set to Use Default.
5-8 2VAA003209-230 A
Setting up system to run under low privileged users Create an SQL User
NOTE: a red light in PwMonitor does not necessary mean the problem is related to user permissions, it is an indication
about unsuccessful connection with Historian database
Run Microsoft SQL Server Management Studio
2VAA003209-230 A 5-9
Create an SQL User Setting up system to run under low privileged users
5-10 2VAA003209-230 A
Setting up system to run under low privileged users Create an SQL User
2. Click O.K
3. Re-open the User details and check:
4. Go to Server Roles tab, select the following check boxes:
– public
– sysadmin
2VAA003209-230 A 5-11
Create an SQL User Setting up system to run under low privileged users
5. Click OK.
6. Go to User Mapping tab, select the following check boxes
For User mapped to this login:
– Check the checkbox PlaCoEventMYVM\SPlusOServiceUser dbo
Database role mambership for tempdb:
– Select public
7. Click OK.
8. Go to Securables tab, check the following checkbox:
– Permission Connect SQL sa set (column grant)
5-12 2VAA003209-230 A
Setting up system to run under low privileged users Create an SQL User
9. Click OK.
10. Go to Status tab, For Permission to connect to database engine option, choose Grant radio button.
– For Login, choose Enabled radio button.
2VAA003209-230 A 5-13
Exiting from the system Setting up system to run under low privileged users
5-14 2VAA003209-230 A
Setting up system to run under low privileged users User Account Settings
2. Click OK.
3. Restart the system and S+ Operations system will run with low privileges and UAC enabled.
2VAA003209-230 A 5-15
User Account Settings Setting up system to run under low privileged users
5-16 2VAA003209-230 A
User Roles in Symphony Plus
Engineering Roles
2VAA003209-230 A A-1
User Roles in Symphony Plus
Operation Roles
Historian Roles
A-2 2VAA003209-230 A
User Roles in Symphony Plus
26 SPlusWDNAlarmsDBAdmin SPlusWDNAlarmsDBAdmin
GIS Roles
2VAA003209-230 A A-3
User Roles User Roles in Symphony Plus
Example 2: A user role is created as ENGINEER, with the security privileges as tag operations-privileges. Now, two
windows users can be derived as ENGINEER 1, ENGINEER 2 from this user role ENGINEER.
A-4 2VAA003209-230 A
User Roles in Symphony Plus Customized Roles
NOTE: During the first launch of User Management user have an option to configure the Custom Role.
Navigate to Administration > User Management , click Configure Roles button in the ribbon bar, Configure Roles
window opens as show as in the figure..
• Standard Roles: The S+ engineering standard roles are displayed in Standard Roles pane.
• Customized Roles: All the groups which is available in the machine will be displayed.
• View: It will display all the customized Roles against the Standard Roles.
2VAA003209-230 A A-5
Customized Roles User Roles in Symphony Plus
To create new Customized Role, enter the name in the Customized Name text box and add description in Description text
box, then select Standard roles and Click Add as shown as in the below figure
To view Customized Roles mapped against Standard Roles, click on the View tab in the Configure Roles window.
A-6 2VAA003209-230 A
User Roles in Symphony Plus Customized Roles
To filter the roles, right click in the Customized Roles pane for filtering the Roles and select Show Customized Groups
option as shown as in the below figure
2VAA003209-230 A A-7
Customized Roles User Roles in Symphony Plus
A-8 2VAA003209-230 A
User Roles in Symphony Plus Customized Roles
To filter the roles, right click in the Customized Roles pane for filtering the Roles and select Show All Groups option as
shown as in the below figure
2VAA003209-230 A A-9
Customized Roles User Roles in Symphony Plus
A-10 2VAA003209-230 A
User Roles in Symphony Plus Customized Roles
To edit the custom role, select the custom role and edit the mappings in the Standard Roles pane then click Update button
as shown as in the figure.
NOTE: Custom role configuration is incomplete, either user should maintain standard roles or custom roles. combination
of both standard role and custom role is not allowed.
NOTE: Customized Roles are not recommended to modify from the windows group, if customized roles are modified
from windows group, then while opening User management, it shows an error message as shown as in the figure.
2VAA003209-230 A A-11
Existing common Symphony Plus user groups User Roles in Symphony Plus
NOTE: The existence of custom roles can be viewed in User management as well under S+ Roles pan, the example is
shown the below figure.
SPlusOUsers General rights group that all S+ Operations users Gives read access to the Windows directories where
must join S+ Operations is located, also grants certain
permissions to debug and logging directories.
Is part of History Group 3.
SPlusOAdmins Administrator group that can do all Symphony Plus Is similar to a Windows Administrator and can do all
and Windows administration administration tasks in Windows
SPlusOGuests Guest user Has no Windows rights but is part of History Group 1
Note: Create the group manually in the Windows
user management
SPlusScanner Write real time data to the historian All services that require to write data to the historian.
SPlusIMEventReader Operator and Office users for read access to event Group that has read access to all alarms/events in
history data. All S+ Operations users must join the database
Run the Delete Events tool and use the export
function
Run the Manual Events tool
Run the EventProcessor tool
SPlusIMEventConfig Reader and configuration of event tables All permissions of group SPlusIMEventReader
Update/Insert permissions on tables that contain
configuration data (the database tables are called:
tbl_EventExplorer_Confi,
tbl_EventClientHeader)
EventExplorer: Edit and save event configurations
A-12 2VAA003209-230 A
User Roles in Symphony Plus Existing common Symphony Plus user groups
SPlusIMEventAdmin Read and full rights to event table All permissions of group SPlusIMEventReader
Select/Update/Insert/Delete permissions on all event
database tables
EventExplorer: Edit Blacklist
Run the Delete Events tool with all functions
Typically, normal operator users are assigned to SPlusOUsers and to SPlusIMEventReader group.
Only special users such as used for the installation or administration should be using higher privileged accounts.
For the event database, please refer to the below table in order to understand the different user groups.
2VAA003209-230 A A-13
Registry settings User Roles in Symphony Plus
If the LocalAccountTokenFilterPolicy registry entry does not exist, follow these steps:
1. Locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
2. On the Edit menu, point to New, and then click DWORD Value.
3. Type LocalAccountTokenFilterPolicy, and then press ENTER.
4. Right-click LocalAccountTokenFilterPolicy, click Modify.
5. In the Value data box, type 1, and click OK.
6. Exit Registry Editor.
Note: Value Description
• 0: This value builds a filtered token. This is the default value. The administrator credentials are removed.
• 1: This value builds an elevated token.
Once done, system restart is recommended.
A-14 2VAA003209-230 A
User Roles in Symphony Plus Role Based Access Control
Workbench:
User Management:
2VAA003209-230 A A-15
Role Based Access Control User Roles in Symphony Plus
Project Administration:
Note: SPSystemAdmin role is not granted for users accessing Project Administration module.
Bulk Engineering:
A-16 2VAA003209-230 A
User Roles in Symphony Plus Role Based Access Control
Note: SPSytemAdmin, SPEngineerAdmin, SPELoad, SPEMonitor, SPESimulate, and SPELibrary roles are not
granted for the users accessing Bulk engineering module.
2VAA003209-230 A A-17
Role Based Access Control User Roles in Symphony Plus
Topology Design:
Note: SPSystemAdmin, SPEngineerAdmin, SPELoad, SPEMonitor, and SPESimulate roles are not granted for the
users accessing Topology design module.
A-18 2VAA003209-230 A
User Roles in Symphony Plus Role Based Access Control
Connectivity Engineering:
2VAA003209-230 A A-19
Role Based Access Control User Roles in Symphony Plus
Note: SPSystemAdmin, SPUser, SPEngineerAdmin, SPELoad, SPEMonitor,SPESimulate, and SPELibrary roles are
not granted for the users accessing Connectivity engineering module.
A-20 2VAA003209-230 A
User Roles in Symphony Plus Role Based Access Control
Control Engineering:
2VAA003209-230 A A-21
Role Based Access Control User Roles in Symphony Plus
A-22 2VAA003209-230 A
User Roles in Symphony Plus Role Based Access Control
2VAA003209-230 A A-23
Role Based Access Control User Roles in Symphony Plus
A-24 2VAA003209-230 A
User Roles in Symphony Plus Role Based Access Control
2VAA003209-230 A A-25
Role Based Access Control User Roles in Symphony Plus
A-26 2VAA003209-230 A
User Roles in Symphony Plus Role Based Access Control
2VAA003209-230 A A-27
Role Based Access Control User Roles in Symphony Plus
A-28 2VAA003209-230 A
User Roles in Symphony Plus Role Based Access Control
2VAA003209-230 A A-29
Role Based Access Control User Roles in Symphony Plus
A-30 2VAA003209-230 A
User Roles in Symphony Plus Role Based Access Control
2VAA003209-230 A A-31
Role Based Access Control User Roles in Symphony Plus
A-32 2VAA003209-230 A
User Roles in Symphony Plus Role Based Access Control
2VAA003209-230 A A-33
Role Based Access Control User Roles in Symphony Plus
A-34 2VAA003209-230 A
User Roles in Symphony Plus Role Based Access Control
Note: SPSystemAdmin, and SPEngineerAdmin roles are not granted for the users accessing Control engineering
module.
Note: SPEAccess role is mandatory for Control Engineering, if user does not have SPEngineerAdmin and
SPSystemAdmin role.
2VAA003209-230 A A-35
Role Based Access Control User Roles in Symphony Plus
Field Engineering:
A-36 2VAA003209-230 A
User Roles in Symphony Plus Role Based Access Control
2VAA003209-230 A A-37
Role Based Access Control User Roles in Symphony Plus
Signal Manager:
Note: SPSystemAdmin, SPEngineerAdmin, SPESimulate and SPELibrary roles are not granted for the users accessing
Signal manager module.
A-38 2VAA003209-230 A
User Roles in Symphony Plus Role Based Access Control
Operations Engineering:
Note: SPSystemAdmin, SPEngineerAdmin, SPEMonitor, and SPESimulate roles are not granted for the users
accessing Operations engineering module.
Note: SPEAccess role is mandatory for Operations Engineering, if user does not have SPEngineerAdmin and
SPSystemAdmin role.
2VAA003209-230 A A-39
Role Based Access Control User Roles in Symphony Plus
If any required role is not associated any user, then a pop-up message shall be displayed to notify the user, also the
respective action gets disabled for that user. A typical message is shown as in Figure A-57
A-40 2VAA003209-230 A
Installing Microsoft Loopback Adapter
3. Press Enter.
This opens the Welcome to the Add Hardware Wizard dialog box.
4. Click Next.
This opens the Add Hardware dialog box.
5. Select the Install the hardware that I manually select from a list (Advanced) radio button.
6. Click Next.
7. Select Network adapters from the list.
8. Click Next.
2VAA003209-230 A B-1
Installing Microsoft Loopback Adapter
mp
9. From the List of Manufacturer, select Microsoft and then from the list of Network Adapter, select Microsoft Loop-
back Adapter.
10. Click Next > Next > Finish.
B-2 2VAA003209-230 A
Computer Browser Service
Computer Browser service is required for identifying the members of a particular workgroup.
NOTE: User can check the workgroup discovery status by using the following windows command:
2VAA003209-230 A C-1
Computer Browser Service
C-2 2VAA003209-230 A
Creating Group Policy Object Creating Group Policy
2VAA003209-230 A D-1
Creating Group Policy Creating Group Policy Object
3. Enter a name for the GPO (ex: gpo-local-admin) in the New GPO dialog box as shown in the following figure
4. Click OK.
D-2 2VAA003209-230 A
Creating Group Policy Object Creating Group Policy
5. Right-click on Local Admin Rights GPO and click Edit as shown in the following figure.
In the Group Policy Management Editor window, select Restricted Groups (expanding Computer
configuration\Policies\Windows Settings\Restricted Groups) right-click and select Add Group....
2VAA003209-230 A D-3
Creating Group Policy Creating Group Policy Object
The selected group is listed in the right pane of the window as shown in the following figure.
7. Right-click on the group and select Properties to add the group to make it a member of other groups (like
Administrators, Remote Desktop Users etc.)
The properties dialog box opens.
8. Click Add button under Member of this group field in the Properties dialog box as shown in the following figure.
D-4 2VAA003209-230 A
Creating Group Policy Object Creating Group Policy
Add the SPSystemAdmin, SPEngineerAdmin, SPEngineer roles as shown in the following figure.
2VAA003209-230 A D-5
Creating Group Policy Creating Group Policy Object
9. Click OK.
NOTE: It takes some time for these changes to reflect in all domain clients. User can login into any domain client
and type “gpupdate /force” command and check local administrators group.
D-6 2VAA003209-230 A
—
Visit us
solutions.abb/symphonyplus
Back Cover