PC Security Manager Software PCS B 70.9703.0 Operating Manual 12.
Contents 1 Introduction 7 1.1 Preface .......................................................................................................... 7 1.2 Arrangement of the documentation ........................................................... 8 1.3 Typographical conventions ......................................................................... 8 2 PC Security Manager software (PCS) 2.1 General ...................................................................................................
Contents 6.4 View according to profile ........................................................................... 42 6.4.1 Profiles ......................................................................................................... 43 6.4.2 Programs/devices ........................................................................................ 44 7 Data transfer to device 45 7.1 Transfer via CompactFlash memory card ................................................ 46 7.
Contents 13 Index 69
Contents
1 Introduction 1.1 Preface B Please read this operating manual before commissioning the software. Keep the manual in a place that is accessible to all users at all times. Please assist us to improve this operating manual, where necessary. Your suggestions will be appreciated. H However, if any difficulties should arise during start-up, please do not carry out any unauthorized manipulations.
1 Introduction 1.2 Arrangement of the documentation The documentation for this software is addressed to equipment manufacturers (OEMs) and users with appropriate technical expertise. 1.
1 Introduction Representation Keys h+E Keys are shown in a box. Both symbols and text are possible. If a key has a multiple function, then the text shown is the one that corresponds to the function that is active at the moment. Screen texts Program Manager Texts that are displayed in the setup program are indicated by italic script. Menu items Edit ! device data Menu items in the software which are referred to in this manual are shown in italics.
1 Introduction 10
2 PC Security Manager software (PCS) 2.1 General The PC Security Manager software (PCS) ensures that only authorized persons can gain access to the system components (device, PC software) and implement electronic signatures on electronic documents. The configuration of the Security Manager can only be performed by the system administrator, on an administrator PC. The administrator can create PC- and device-dependent user lists (rights files) and transmit them to various computers or devices.
2 PC Security Manager software (PCS) 2.2 Minimum configuration The following hardware and software requirements have to be met for installing and operating the PCS: - IBM-PC or compatible PC with Pentium1 processor or higher - 64MByte main memory - CD drive - mouse - one free serial interface or network connection, or CompactFlash memory cards (depending on the type of data transmission to the paperless recorder) - 120MByte available on hard disk - Microsoft Windows2 NT4.
3 Installation 3.1 Starting the installation Installation program - run h Start Microsoft Windows H If Microsoft Windows has already been started, then before the installation of the software you will have to close down all other Windows programs. h Place the CD in the drive and close the door. When the CD has been activated, the installation program will start automatically. If not, proceed as follows: h Start the file Setup.exe (in the root directory of the CD).
3 Installation h Select the components that need to be installed. Software that is to be installed must be marked by a tick ( ). The PCS software is only accessible for administrators. h Now enter the required license numbers. H If a software component is activated as a demo version during installation ( ), then some of the functions of this software (such as data transmission, saving data, printing out) will be disabled.
3 Installation h Define the program folder in which the icons for starting the software are to be copied. 3.2 Selecting the installation option h Decide on an installation option. Description of the installation options h Enter the path and file name for the user list. Administrator The “Administrator” option is only available if the PCS software has been selected for installation (Page 14). If you install the software with this option, then the user list that is defined will be freshly generated.
3 Installation 3.3 Carrying out the installation h The final action is to click on the installation. button, to initiate the actual The selected software components will now be installed. When the installation is finished, you will have the opportunity of starting the PCS software directly. h Allow the PCS to be started, and then finish the installation by pressing the button.
4 User List Assistant After a new installation, the User List Assistant will be started automatically when the software starts up for the first time. An entry form appears, in which you can enter a description and the name of the author (this is normally the administrator). You will see these details again later, when editing the user list. 4.1 Password rules The password rules are defined with the help of the dialog.
4 User List Assistant Min. number of characters The minimum number of characters (letters and digits) for the length of the password. 0 = any (from 1 to 10 characters can be entered). Min. number of letters The number of letters that must be included in the password. 0 = no letters required. Min. number of upper-case (capital) letters (A to Z) The number of upper-case letters that must be included in the password. Min.
4 User List Assistant 4.2 Defining the administrator h Enter the user ID and name for the administrator, and click on . You can also enter a description, but this is not compulsory. H h Click on Do not enter a password or password confirmation at this stage. These details can be entered in one of the subsequent dialogs. to close the User List Assistant. The PC Security Manager software will now be started.
4 User List Assistant 4.3 Log-in to the program Password entry Options are concealed here. vChapter 10 “Options at program start” h Log in to the program. Enter the name defined in Chapter 4.2, and the password (if you did not specify a password in Chapter 4.2, leave this field empty). h Click on . Password alteration h Enter the previous (old) password (leave the field empty if you did not specify a password in Chapter 4.2 ). h Enter the new password, and the confirmation of the password.
5 User interface 5.1 Elements of the user interface Menu bar Toolbar Navigation tree Dialog window The settings are displayed here. Connection status Menu bar Details of the currently logged-in user The individual functions of the software can be started by using the menu bar. v Chapter 9 “Menu functions and symbols” Toolbar The toolbar contains selected functions from the menu bar. They can be started by pressing the left mouse button.
5 User interface change dialog. One click on “Arrow to right” ( ) before the entry will list the current setting in the dialog window, one click on “Arrow down” ( ) will hide the current setting again. Example: The change dialog has been started. Example: Shows the current settings as a list.
5 User interface Connection status In the “Connection status” line you can verify whether there is a connection to a device, and which interface data are used. The line can be switched into/out of display by using the Window ➔ Connection status function. Example: not connected Example: connected to a device The line can be shifted in the same way as the toolbar. In order to do this, you have to move the mouse pointer to the position shown below, before pressing the left mouse button.
5 User interface 24
6 Editing user lists Four different views are used when editing the user lists: - Data listed by device - Data listed by individual PC - Data listed by individual user - Data listed by individual profile The changeover between the different types of view is made through the View menu, or by using the toolbar.
6 Editing user lists 6.1 View according to device This view is shown automatically when the program starts. You can add new devices to it, edit existing ones, and permit individual users access to the devices. If the view is not active, proceed as follows: h Call up the function View ! View according to device or activate the corresponding button in the toolbar. View according to device H 26 At present, the PCS software only supports devices of type “LOGOSCREEN es”.
6 Editing user lists 6.1.1 Devices h In the navigation tree, position the mouse pointer over the type you want to insert (e.g. Device type: “LOGOSCREEN es”) and press the right mouse button. New device h In the following dialog, select “New device” and then enter the necessary details for the device that is to be added to the list. New device ! Device name Enter the name of the device here.
6 Editing user lists Simplified entry Standard editor H You should activate the “Simplified entry” option, since this makes it considerably easier to enter a password on the device. New device ! Electronic signature at end of batch When this option is activated ( - factory setting), an electronic signature can be provided at the end of a batch report.
6 Editing user lists New device ! Standard rights By clicking on the button for Standard rights you define the rights that every new user automatically receives for the device, which also apply when no user is logged into the device. The standard rights can later be extended on a userspecific basis. h Activate all the functions that are required by clicking on the corresponding empty box ( ). h Close the entry of standard rights by clicking on the button.
6 Editing user lists Device type: Edit LOGOSCREEN es If a device type has been selected in the navigation tree, then this function cannot be called up. It can only be called up when a device or a user has been selected in the navigation tree. The designation of the function will change, depending on the selection (e.g. Device name: Edit recorder 1 or Edit Admin device rights). With this function you can make alterations to the settings for a device or a user.
6 Editing user lists 6.1.2 User If you use the right mouse button to click on a device name in the navigation tree, you will get the following function selection: Compared with the functions found under Chapter 6.1.1 “Devices”, there is the following difference: New user rights If devices have been defined, the function is available. It can be used to give users the right to operate a specific device. h Select the intended user and a rights profile, and close the entry with .
6 Editing user lists All standard rights – defined when the device was created – are marked in yellow. Now you can extend the rights. h Close the dialog with . The selected user (e.g. Administrator Admin) now has the right to access the device “Recorder1”. H Further information about the symbols for assigning rights: The user has the right, regardless of the standard rights for the device. The user has the right, as assigned by the standard rights for the device.
6 Editing user lists Maximum number of users H Device user lists (device rights files) must be transferred to the corresponding devices, so that they are available and users can log themselves in at these locations. If more than 50 users are assigned to a device, then only 50 will be sent to the device. v Chapter 7 “Data transfer to device” Please note: - Locked-out users will not be included in the device rights file.
6 Editing user lists 6.2 View according to PC This view can be used to define and alter the PCs on which individual software components should run. The users who are allowed to have access to the software must be registered for each PC and for each software component. h Call up the function View ! View according to PC or activate the corresponding button in the toolbar. View according to PC The computer with the name PC is available as standard after a new installation of the PC Security Manager software.
6 Editing user lists 6.2.1 Computer Using the right mouse button, click on a computer name in the navigation tree (e.g. computer name: PC), and you will then have the following function selection: New PC This function is used to add in a new PC. You have to provide the information on - computer name - work group - comparison type - description (optional) The information on Computer name and Work group are particularly important when you want to activate the corresponding comparison type.
6 Editing user lists New user rights This function is used to - enable new programs for use on a PC, and - authorize users to access and use programs. Various selectable options (profiles) are available for the assignment of rights. v See Chapter 6.4 “View according to profile” Computer name: PC – edit With this function you can alter the properties of the PC (as entered under New PC).
6 Editing user lists 6.2.2 User Using the right mouse button, click on a user, underneath a software in the navigation tree (e.g. Admin: Name), and you will then have the following function options. Compared with the functions found under Chapter 6.2.1 “Computer” there is the following difference: Program rights: Admin – edit This function can be used to check and alter the rights that have been assigned to the selected user.
6 Editing user lists 6.3 View according to user This view can be used to define and alter the users. h Call up the function View ! View according to user or activate the corresponding button in the toolbar. View according to user The user Admin already exists. In this example, it was already defined during the installation of the software. 38 Click on in order to see the expanded display. Click on in order to see the reduced display.
6 Editing user lists 6.3.1 User Using the right mouse button, click on a user in the navigation tree (e.g. User ID: Admin), and you will then have the following function options. New user This function is used to add in a new user.
6 Editing user lists Finish the entry with and then you can alter the rights. All standard rights – defined when the device was set up – are marked in yellow. Now you can extend the rights. h Close the dialog by clicking on . The administrator Admin has now acquired the right to access the device “Recorder1”. Of course, access can only be made after the device rights file has been sent and read into the device.
6 Editing user lists User ID: Admin – maximize (or minimize) This functions enlarges or reduces the representation in the dialog window. It has the same effect as using the arrows in the dialog window. Maximized representation: Minimized representation ... The other functions are only intended for the documentation of the entries. 6.3.2 PC Using the right mouse button, click on a PC, underneath a software in the navigation tree (e.g. PC), and you will then have the following function options.
6 Editing user lists 6.4 View according to profile This view can be used to define and alter the profiles. A profile is used to provide a pre-prepared rights setting when setting up new authorizations for devices or PC programs. The use of a profile simplifies the work of assigning rights to a user. h Call up the function View ! View according to profile or activate the corresponding button in the toolbar. View according to profile The profiles for Administrator and Maintenance already exist.
6 Editing user lists 6.4.1 Profiles Using the right mouse button, click on a profile in the navigation tree (e.g. Profile name: Administrator), and you will then have the following function options. New profile This function is used to add in a new profile. You have to provide the information on - profile name, and - description (optional) New profile rights This function can be used to add rights to a profile, for access to a PC program or a device type. v See “New device Ë Standard rights” on Page 29.
6 Editing user lists 6.4.2 Programs/devices If you use the right mouse button to click on a program or a device type underneath a profile in the navigation tree, you will get the following function selection: Compared with the functions found in Chapter 6.4.1 “Profiles” there is the following difference: Program rights PCA3000 – edit (Device rights ... – edit) This function can be used to check and alter the rights that have been assigned for the selected program or the selected device.
7 Data transfer to device There are two ways of transferring a device user list to a paperless recorder: - Transfer via CompactFlash memory card (Data transfer ➔ Create device rights file) and - Transfer via interface (Data transfer ➔ Create device rights file) 45
7 Data transfer to device 7.1 Transfer via CompactFlash memory card In order to be able to read or write to CompactFlash memory cards on a PC, you will need a reader/writer. When you have installed the reader/writer and inserted a CompactFlash memory card, you will automatically have a new drive available under Windows. You can use the new drive just like a normal hard disk, using the Windows Explorer.
7 Data transfer to device h Call up “View according to device”. h Select the device for which you want to create a device rights file. h Press the button “Create device rights file”. After the target drive has been selected (the one for the CompactFlash memory card), the device rights file is created. This can then be read into the device by using the device software (menu CompactFlash card).
7 Data transfer to device 7.2 Transfer via interface Data transfer via interface is possible through one of the following interfaces: Setup – RS232C Paperless recorder PC Setup interface RS232C RS232C RS232C RS422/485 RS422/485 (plug-in card or converter) Ethernet Ethernet You will need the interface cable (including adapter) for this. It is available as an accessory for the recorder. TTL/RS 232 converter Adapter RS232C v For the pin assignment, please refer to the Interface Description B 70.
7 Data transfer to device 7.3 Connection between the PC and the recorder If data are to be exchanged between a recorder and a PC, it is essential to define which device and which route is to be used for communication, and to establish the connection to the device. Connection to a device is made by using the function Data transfer ➔ Establish connection or by a click on the symbol. 7.3.
7 Data transfer to device Save ID and password Do not log in No log-in The default setting of the setup software is that a user who is logged in is automatically logged in to a device that is found with the user’s name and password, and can thus communicate with the device if the necessary rights have been enabled for him in the device user list. Set this option ( ) if you do not want to log in. In this case, the standard settings for the device will be used.
7 Data transfer to device TCP/IP PORT Analog modem / ISDN The following parameters must be selected. IP address / HOST name xxx.xxx.xxx.xxx (Example: 10.11.2.100 or Hall1-Furnace1) Enter the IP address of your PC. If you enter the name, the IP address can be determined by clicking on the button “Convert HOST name to IP address”. Port number, port name 502 The port used for communication. Communication protocol Modbus TCP/IP, Modbus protocol Set the Modbus TCP/IP here.
7 Data transfer to device Serial interface The following parameters must be selected. Connected to COM1, COM2 The PC interface to which the paperless recorder is connected. Transmission rate 9600, 19200, 38400 The transmission rate must match the one that has been set in the device. Control signal RS232 If the RS232 interface on the device is used. RS232 setup interface If the setup interface on the device is used. RS422-RTS If the RS422/485 interface on the device is used.
7 Data transfer to device 7.4 Device list All devices that have been defined are shown in a device list. The interface parameters are also administered here, and new, additional devices can also be defined in the device list. Make a connection to the selected device. Remove device(s) from the list. Alter properties Add a new device Interfaces areautomatically searched for devices Use the Assistant to carry out the function “Add new device” or “Alter properties”.
7 Data transfer to device 7.5 Incorrect log-in to device If you want to access a device from within the setup software, it is possible that you are unable to log in to the device. The probable cause is that you are not registered as a user (incorrect device-rights file) or the password for the PC and device do not match, or the device password has expired (solution: alter the password).
8 Data transfer to a PC When setting up user lists for PCs, the way in which the software components are installed on the target PC must be taken into consideration. There are two types of PC user list. - user lists for PCs on which the software components are installed by using the installation option “Network user”, and - user lists for PCs on which the software components are installed by using the installation option “Local user”.
8 Data transfer to a PC H Before carrying out an installation of software components, using the “Network user” or “Local user” option, you must carry out an installation with the “Administrator” option on one PC. The administrator PC is then used to create the user lists and PC rights files that have to be transmitted to the other PCs. 8.
9 Menu functions and symbols 9.1 File New When this function is called up, the User List Assistant will be started and a new user list will be set up. Change user list An existing user list is declared as the active list. Export as RTF text The current user list can be saved as an RTF file. The precise contents are determined by the active line in the navigation tree. For instance, a separate RTF file can be created for a specific device or for a specific user.
9 Menu functions and symbols New device, New PC, New user, New profile Depending on which view is active, a new device, PC, user or profile can be inserted into the user list. The function can also be started by clicking with the right mouse button on an entry in the navigation tree. New user rights, New profile rights Depending on which view is active, user rights can be assigned for access to a device or a program, or you can incorporate a program or device type in an existing profile.
9 Menu functions and symbols 9.4 Extras Enable (unlock) program options If no valid license number was entered during the installation of a program, then it will only run in demo mode, and some functions, e.g. “save”, will be blocked. This function can be used to register a program at a later date and so change it from a demo version into a full version.
9 Menu functions and symbols Comment in audit trail This function can be used to make a manual entry in the audit trail. The audit trail entries of the PC software components can be checked and documented by using the PC Audit Trail Manager software. Please note that device audit trail data are evaluated by the PC Evaluation Software (PCA3000). 9.5 View According to device Display of all available devices. According to PC Display of all available computers.
10 Options at program start If you start up the PC Security Manager, you have the opportunity of setting various options when you log in. Proceed as follows: h Start the software h Before you log in, click with the left mouse button on options are displayed. , so that the Show options The dialog window changes to ... After log-in – change the user list This option is deactivated in the log-in dialog of the PCS software. The function can be found in the menu File ➔ Change user list.
10 Options at program start 62
11 Example 11.1 Devices In this example, a device rights file can be created for two devices (Recorder 1 and Recorder 2). The Admin user only has access to Recorder 1. H The administrator must ensure that the correct device rights file is transferred to the correct device.
11 Example 11.2 PCs In this example, there are two computers (C-Admin and C-User). PC C-Admin All the software components are available on C-Admin, but the Master and User users are only allowed access to the Setup software. PC C-User C-User can only run the PCA Communications Server software (PCC), and the Admin user is not authorized to use this software.
11 Example 11.3 User Navigation tree Dialog window The settings are shown here. In this example, there are three users (Admin, Master and User). Admin The Admin user has access to all programs and both recorders. Master / User The two users only have access to the PCC software, the Setup software, and the recorders (devices).
11 Example 66
12 FAQ FAQ 1 What is the name of the current user list, and where is it located on the hard disk? The name and location of the current user list can be found under the item “General security settings”. A click on the or arrow will show the setting, or hide it again.
12 FAQ 68
13 Index A According to device 60 According to PC 60 According to profile 60 According to user 60 Administrator 11, 14–15, 17, 19 After log-in – alter password 61 After log-in – change user list 61 Analog modem / ISDN 51 Assistant for Device Settings 49 B Break connection 58 C Change 57 Change user list 57 Comment in audit trail 60 Commissioning 7 CompactFlash 46 Compress user list 59 Computer name 35 Connected 53 Connection 49 Connection status 23, 60 Create device rights file 58 Create PC rights file 58
13 Index Ethernet 48 Exit 57 Export as RTF text 57 H Hardware requirements 12 I Incorrect log-in 54 Incorrect log-in to device 54 Info on ... 60 Installation 13, 16 Installation option 15 K Keys 9 L License agreement 13 License number 14 Local user 15, 55, 58 M Make connection 58 Max.
13 Index O Options at program start 61 P Password 54 Password alteration 20, 59 Password entry 27 Password rules 17 Print 57 Print preview 57 Printer setup 57 Program folder ... 60 Program installation 13 R Recommended configuration 12 Registered license numbers ...
13 Index via interface 45, 48 U Update 60 User 54 Standard (default) password 54 Standard (default) user 54 User list 11, 15, 55 User list – in device 58 User List Assistant 17 User rights 31, 36 V View according to device 26 according to PC 34 according to profile 42 according to user 38 W Warning signs 8 Warranty rights 7 Work group 35 Working area 21 72
JUMO GmbH & Co. KG JUMO Instrument Co. Ltd. JUMO Process Control, Inc. Street address: Moltkestraße 13 - 31 36039 Fulda, Germany Delivery address: Mackenrodtstraße 14 36039 Fulda, Germany Postal address: 36035 Fulda, Germany Phone: +49 661 6003-0 Fax: +49 661 6003-607 e-mail: mail@jumo.net Internet: www.jumo.net JUMO House Temple Bank, Riverway Harlow, Essex CM20 2TT, UK Phone: +44 1279 635533 Fax: +44 1279 635262 e-mail: sales@jumo.co.uk Internet: www.jumo.co.