Академический Документы
Профессиональный Документы
Культура Документы
WARNING: Identifies information about practices or circumstances that can cause an explosion in a hazardous environment, which may lead to
personal injury or death, property damage, or economic loss.
ATTENTION: Identifies information about practices or circumstances that can lead to personal injury or death, property damage, or economic
loss. Attentions help you identify a hazard, avoid a hazard, and recognize the consequence
Important:
Identifies information that is critical for successful application and understanding of the product.
SHOCK HAZARD: Labels may be on or inside the equipment, for example, a drive or motor, to alert people that dangerous voltage may be
present.
BURN HAZARD: Labels may be on or inside the equipment, for example, a drive or motor, to alert people that surfaces may reach dangerous
temperatures.
ARC FLASH HAZARD: Labels may be on or inside the equipment, for example, a motor control center, to alert people to potential Arc Flash. Arc
Flash will cause severe injury or death. Wear proper Personal Protective Equipment (PPE). Follow ALL Regulatory requirements for safe work
practices and for Personal Protective Equipment (PPE).
Allen-Bradley, Rockwell Software, Rockwell Automation, and TechConnect are trademarks of Rockwell Automation, Inc.
Trademarks not belonging to Rockwell Automation are property of their respective companies.
Summary of changes
This manual contains new and updated information. Changes to this manual are
documented in the following table.
Change
Topic
Table of contents
Preface
Chapter 1
Security
Introduction ............................................................................................................ 9
FactoryTalk Security ............................................................................................ 10
FactoryTalk Directories ............................................................................... 10
Chapter 2
Configuring FactoryTalk
Security with Logix Designer
application
Introduction .......................................................................................................... 11
Installing the Rockwell Software Security Emulator...................................... 11
Enabling security ................................................................................................... 11
Installing FactoryTalk Services Platform software ......................................... 13
Securing a Logix Designer application project file .......................................... 14
Applying security to a controller resource ........................................................ 20
Chapter 3
Migrating from a security
server database to a
FactoryTalk server
Introduction .......................................................................................................... 25
Importing a security server database.................................................................. 25
Importing Status text file ............................................................................. 29
Organizer import result ................................................................................ 30
Resource Editor.............................................................................................. 30
Chapter 4
Configuring source
protection in the Logix
Designer application
Introduction .......................................................................................................... 31
Enabling source protection ................................................................................. 31
Applying source protection................................................................................. 31
Specifying a source key file ........................................................................... 32
Protecting components ................................................................................ 34
Viewing components without a key ........................................................... 40
Verifying source protection on a component .................................................. 43
Specifying the path to a different sk.dat file .............................................. 43
Use the Clear button .................................................................................... 45
Using the Disable Ability to Configure Source Protection button ...... 46
Removing access to a protected routine ............................................................ 46
Disabling routine source protection.................................................................. 47
Rockwell Automation Publication 1756-PM016G-EN-P - October 2014
Table of Contents
Chapter 5
Securing a ControlLogix
controller
Introduction .......................................................................................................... 49
Installing the Logix CPU Security Tool ........................................................... 49
Securing a ControlLogix controller with Logix CPU Security Tool .......... 49
Accessing a secured controller ..................................................................... 53
Removing security from a controller with the CPU Security Tool...... 56
Removing a password .................................................................................... 58
Index
Preface
This manual explains how to configure security for Logix Designer application. It
also explains how to set up source protection for your logic and projects. This
manual is one of a set of related manuals that show common procedures for
programming and operating Logix5000 controllers.
For a complete list of common procedures manuals, refer to the Logix5000
Controllers Common Procedures Programming Manual, publication
1756-PM001.
The term Logix5000 controller refers to any controller that is based on the
Logix5000 operating system.
Preface
Additional resources
Description
Chapter 1
Security
Introduction
This chapter discusses security related features available in the Logix Designer
application.
In version 20 or later of the application, security enhancements provide:
The Logix platform, version 18 or later, provides Data Access Control through
two new tag attributes: External Access and Constant. Together, these attributes
let you control access to tag data and help to safeguard tags by preventing
unwanted changes to their values. For more information about Data Access
Control, see the Logix5000 Controllers I/O and Tag Data Programming Guide,
publication 1756-PM004.
Chapter 1
Security
FactoryTalk Security
FactoryTalk Directories
The FactoryTalk Directory is an important aspect to implementing FactoryTalk
Security. In the FactoryTalk architecture, there are two separate Directory types,
Local and Network. A FactoryTalk Local directory is sometimes utilized when all
the Rockwell Automation Software products run on a single computer. Use the
Local FactoryTalk Directory for products such as FactoryTalk View Machine
Edition (ME) and FactoryTalk View Site Edition (SE) Station (Standalone). Use
the FactoryTalk Network Directory when multiple Rockwell Automation
Software products need to share information across multiple computer systems.
The FactoryTalk Network Directory allows these systems to share a common
FactoryTalk Directory for products, such as FactoryTalk View SE, FactoryTalk
Integrator, FactoryTalk Batch, and FactoryTalk AssetCenter.
Important:
In version 20 or later of the application, the FactoryTalk Local Directory is not supported.
When securing controllers using version 20 or later of the application, only the
Network Directory is supported. If you are securing controllers using an earlier
version of the application, you can use either the FactoryTalk Local Directory or
the Network Directory. If you are trying to coordinate security across multiple
computers, you need a Network Directory implementation of FactoryTalk
Security. If all of your products reside on a single computer, you can use the Local
Directory. If you have a choice, you might want to use the Network Directory for
forward compatibility with version 20 and later. You can host the Network
Directory locally on each machine just like the Local Directory.
For more information about FactoryTalk Security, see the FactoryTalk Security
System Configuration Guide, publication FTSEC-QS001.
10
Chapter 2
Introduction
RSLogix 5000 software version 19 or earlier uses the Rockwell Software Security
Emulator to communicate with FactoryTalk Security. Starting with version 20,
the application obtains security information directly from the FactoryTalk
Services Platform and does not require RSSecurity Emulator.
If you are using RSLogix 5000 version 19 or earlier, follow these instructions to
install the Rockwell Software Security Emulator.
1. Click the Start button, then click All Programs, then click Rockwell
Software, then click FactoryTalk Tools, and then click RSSecurity
Emulator Install.
2. Follow the installation prompts to complete the installation.
Enabling security
If the Security commands are unavailable, as shown in this picture, you must
enable security for the application.
For version 20 or later of the application, if the security commands are unavailable,
you need to install FactoryTalk Services Platform. See Installing the FactoryTalk
Services Platform software on page 13. If you are using version 20 or later, and the
security commands are available, skip to step 5 below.
If you are using RSLogix 5000 version 19 or earlier, you need to use SetSecKeys to
enable security. Follow the instructions below.
1. For RSLogix 5000 version 19 or earlier, the SetSecKeys software is added to
the system during installation.
Rockwell Automation Publication 1756-PM016G-EN-P - October 2014
11
Chapter 2
2. If prompted to locate the project file, in the Locate Project File dialog box,
select the RS5000Keys.ini file and click Open. The Locate Project File
window appears.
ATTENTION: For RSLogix 5000 version 19 or earlier, if you need to disable FactoryTalk
Security for RSLogix 5000, please contact Rockwell Automation Technical Support.
3. In the Enable/Disable Security Keys dialog box, select the RSLogix 5000
check box, and then click OK.
4. If the RSLogix 5000 Security: Enable dialog box appears, click OK.
5. Open the FactoryTalk Administration Console:
a.
Click the Start button, then click All Programs, then click
Rockwell Software, and then click FactoryTalk Administration
Console.
c.
12
For version 20 or later of the application, security settings come from the
FactoryTalk Network Directory. RSSecurity Emulator is not required and
the FactoryTalk Local Directory is not supported.
Tip:
Chapter 2
If you cannot log on to FactoryTalk, see "I cannot log on to the FactoryTalk
Directory" in FactoryTalk Help.
In the Select User and Computer dialog box, select the user
accounts or groups and click OK.
Installing FactoryTalk
Services Platform software
If you find that the Security feature is not enabled in the Logix Designer
application, then you need to make sure FactoryTalk Services Platform (FTSP)
software is installed properly.
Follow these instructions to install the FTSP software.
1. On the installation disk, browse to \System\FTSP and double-click the
Setup.exe file.
2. Follow the installation prompts to complete the installation.
The installation automatically configures and backs up all existing local and
network FactoryTalk Directory files. For new installations, it backs up the
pre-configured FactoryTalk Directory files. The backups let you restore the
Factory Talk Directory files to a previous software version.
After the installation is complete, refer back to Enabling security on page 11.
If you are having problems, refer to the FactoryTalk Security System
Configuration Guide, publication FTSEC-QS001.
13
Chapter 2
Once you have configured the Logix Designer application to be security aware, the
next step is to enable security in a project file. Follow these steps to secure a project
file.
1. Open Logix Designer.
a.
Click the Start button, then click All Programs, then click
Rockwell Software, and then click Studio 5000.
2. Open the project file that you want to secure. This example uses the
DayOfWeek project file, which is installed with the software. From the
Menu bar, click Help, then click Vendor Sample Projects. On the Quick
Start screen, click Open Sample Projects, and then find the
DayOfWeek.ACD file. Click the DayOfWeek.ACD and then click Open.
14
Chapter 2
3. On the menu bar, click Edit, and then click Controller Properties.
4. Click the General tab to find the controller name. Write down the name
that appears in the Name field. By default, this is the name of the ACD file
that you use later when applying security to a controller resource on page 20
in the FactoryTalk Administration Console.
15
Chapter 2
5. Click the Security tab or the Advanced tab, depending on the version of
the application, to configure the security settings.
16
a.
Chapter 2
When you select a security authority for a project, you can only access the
project and any controller that contains it when you have been granted
access in FactoryTalk Security.
Tip:
c.
For information about the settings found on the Security tab, click
the Help button.
17
Chapter 2
Click the Advanced tab if the Security tab does not appear in the
Controller Properties dialog box.
In the Security box, select FactoryTalk Security.
When you select a security authority for a project, you can only access the
project and any controller that contains it when you have been granted
access in FactoryTalk Security.
18
Chapter 2
8. On the menu bar, click Communications, and then click Who Active to
download the project file to the controller.
9. In the Who Active window, locate and click the controller resource.
19
Chapter 2
11. When the download is complete, close the application. If prompted, save
changes.
Applying security to a
controller resource
The following steps show configuring a single controller for security. When
managing large numbers of users and controllers, Rockwell Automation
recommends that you group users with user groups, group permissions with action
groups, and use the Resource Grouping method to secure your resources to
simplify administration of permissions. For details see the FactoryTalk Help.
Click the Start button, then click All Programs, then click Rockwell Software,
then click FactoryTalk Tools, and then start FactoryTalk Help.
Follow these steps to apply security to a controller resource.
1. Click the Start button, then click All Programs, then click Rockwell
Software, and then click FactoryTalk Administration Console.
2. In the Select FactoryTalk Directory dialog box, click Network or Local,
and then click OK.
20
Chapter 2
4. Go to the controller resource the secured project file was downloaded to.
From the Explorer window, expand Networks and Devices to find the
controller you want to configure.
21
Chapter 2
Example:
If you want the security settings to be inherited by all controllers, right click
Networks and Devices, then click Security. From the Security Settings dialog
box, you can configure security settings that are inherited by all secured projects.
You can still configure unique permissions on a particular device, if needed. For
details see the FactoryTalk Help: Click the Start button, then click All Programs,
then click Rockwell Software, then click FactoryTalk Tools and then click
FactoryTalk Help.
6. In the Logical Name list, choose the Controller name. This name should
match the settings from the Controller Properties dialog box made during
the Securing a Logix Designer Application project file on page 14 section.
You can also type the controller name if the name does not appear in the
list.
22
Important:
Tip:
Chapter 2
The controller in the Network and Devices tree also displays the controller
name property next to the controller resource.
If the name does not appear in the Network and Devices tree, open RSLinx
Classic and go to the controller resource with RSWho. Navigating to the
resource in RSLinx Classic updates the controller path information in RSLinx
Classic. FactoryTalk Administration Console uses the controller path
information from RSLinx Classic to display controllers. Once the path
information is updated in RSLinx Classic, open the FactoryTalk Administration
Console and right-click Network and Devices tree and then click Refresh.
7. Click OK to continue.
23
Chapter 2
9. In the Security Settings dialog box, you can configure security permissions
for a particular user or user group and computer names.
24
Chapter 3
Introduction
To migrate to a FactoryTalk Security server, you must first export the security
server database and then import the database into FactoryTalk.
Follow these steps to import a security server database into FactoryTalk Security.
1. Click the Start button, then click All Programs, then click Rockwell
Software, then click FactoryTalk Tools, and then click Import
RSSecurity Configuration.
2. On the FactoryTalk Security Import dialog box, click Browse to find the
import file, then click the down arrow in the Destination directory box
and choose the destination directory. Click OK.
25
Chapter 3
4. In the Log on to Factory Talk dialog box, type your User name and
Password and then click OK.
26
Chapter 3
5. In the RSSecurity Migration Utility dialog box, select how you want
action and resource groups to be imported into FactoryTalk and then click
OK.
6. In the Import Issue Resolution dialog box, resolve any issues that occurred
during the import, and then click Continue.
27
Chapter 3
9. Click OK.
The import succeeded message appears.
28
Chapter 3
29
Chapter 3
Resource Editor
This image shows the results of the import in the Resources Editor.
30
Chapter 4
Introduction
This chapter describes how to enable and apply source protection for your Logix
Designer components such as routines and Add-On Instructions.
2. Click Yes.
This procedure applies source protection to a project file. When a source key is
applied to a component, that component is source-protected. Source keys are
user-generated, case-sensitive passwords that lock Logix Designer components
from being viewed or modified by third parties.
Important:
31
Chapter 4
This option is not available until you have run RS5KSrcPtc.exe on your workstation. See Enabling source
protection on page 31.
Source protection requires that you specify a source key file location on your
workstation. You are prompted to specify a file location.
3. Click Yes.
4. In the Specify Source Key File Location dialog box, click the Browse
button.
32
Chapter 4
5. In the Browse for Folder dialog box, click the folder to store the key file.
You can save the key file in any accessible folder. In this example the path to
the key file folder is C:\RSLogix 5000\Projects folder. Click OK.
6. In the Specify Source Key File Location dialog box, click OK.
To check for a specific location, on the Source Protection Configuration dialog box, click the Specify
button. A window appears with the location if one exists on your workstation.
33
Chapter 4
Protecting components
The Source Protection Configuration dialog box lists all Program Routines,
Add-On Instructions, and Equipment Phase State Routines in the project file.
You protect these components by applying source keys. Source keys are
user-generated passwords used to lock components. Users that do not have the
source key for a component are not able to modify the component and may not be
able to view the component.
Chapter 4
Use descriptive names to help identify the purpose of the source. For instance, a
source key used to secure components that field engineers require access might be
named, Field Engineer.
Important:
If the same source keys will be used with version 18 and earlier and
version 19 and later of the application, begin each source key with a
lowercase character a-z, or an underscore character ( _ ), and use only
characters lowercase a-z, 0-9 , or an underscore character ( _ ) within the
source keys.
If you use source key names in version 19 and later of the application, and
your source keys are IEC61131-3 compliant, your source keys will still work
in version 18 and earlier.
35
Chapter 4
For version 19 and later of the application, the entered source keys on the
Apply Source Key dialog box are masked by default, but you see the source
key by selecting the Show Source Key check box. If you have version 18 and
earlier of RSLogix 5000 software, your source keys are in clear text.
4. Complete the Apply Source Key dialog box to designate a new source key.
36
Element
Description
Chapter 4
5. Click OK.
The Source Protection Configuration dialog box reappears.
For version 19 and later of the application, source keys may have names. If
the source key has a name, the name appears instead of the source key. In
this example, the name Field Engineer is displayed instead of the source key.
Important:
Source key names cannot be added to existing source keys through the
Logix Designer application.
See Source key file on page 37 to learn how to associate a name to an
existing source key.
For version 19 and later of the application, unnamed source keys are
obfuscated. Three black circles appear after the last character or any
character beyond the fifth character to provide security.
6. Close the Source Protection Configuration dialog box and save the
project file.
Source key files are created in an ANSI format in RSLogix 5000 version 18 and earlier. RSLogix
5000 version 19 and later, and Logix Designer creates UTF-8 formatted sk.dat files. ANSI sk.dat
files modified in RSLogix 5000 version 19 and later, are converted to UTF-8 sk.dat files.
Source keys must not appear on the first line of a UTF-8 formatted sk.dat file. The first line of
UTF-8 formatted sk.dat files is ignored by RSLogix 5000 software version 18 and earlier.
Versions 19 and later insert a header on the first line of the sk.dat file if one is not already
present.
37
Chapter 4
4. Click the mouse at the end of an existing source key and press Enter.
Note that source keys are case sensitive and may use special characters such
as @#$%(){}[].
5. Press Space once and type a name for the source key.
38
Chapter 4
One or more spaces are required to associate the name with the source key.
Source keys always begin in the first column of the line in the text editor. A
source key name must be on the line immediately following the source key
that it is associated with, preceded on the line by at least one space.
Subsequent lines after the source key that are preceded with spaces are
ignored by the application, and can be used for comments.
6. Save the file. If you used an editor other than Notepad, make sure you save
the file as text.
7. Open the Logix Designer application.
8. On the menu bar, click Tools, click Security, and then click Configure
Source Protection. Note that Acme Field Engineer replaces P@ssWOrd
in the Source Key column.
9. To use the named source key, select the named component and click
Protect.
39
Chapter 4
10. In the Source Key to Apply to Select Component(s) box, select the source
key name.
The masked source key name appear.
40
Chapter 4
1. In the Apply Source Key dialog box, in the Source Key to Apply to
Selected Components box, type a source key.
2. In the Confirm New Source Key box, re-type the source key.
3. (optional) In the Source Key Name box, type a name for the source key
4. Select the Allow viewing of components check box.
5. Click OK.
The Test_DOW routine in the following example is source-protected and
can be viewed (as indicated by Yes) in a read-only format on workstations
that do not have the source key.
6. Click Close.
7. Save the project file and download it to the controller.
When the project file is opened on a system that does not contain the source
used to secure the routines and Add-On Instructions, the components are
protected based on the setting in the Source Protection Configuration
dialog box.
Test_DOW is as protected and set to viewable on the Source Protection
Configuration dialog box. You can open the routine as read-only on a
system that does not contain the source key for the routine, but you cannot
modify the routine.
Rockwell Automation Publication 1756-PM016G-EN-P - October 2014
41
Chapter 4
Routines or Add-On Instructions that are protected, but are not configured
as viewable, cannot be opened. The DayofWeek routine cannot be opened
on a system that does not have the key used to protect the routine. In the
example, the icon for the routine is unavailable, indicating the routine
cannot be opened.
The MyValveAOI cannot be viewed on a system that does not contain the
source key used to protect the Add-On Instruction. This is because
MyValveAOI is protected, but not set to be viewable. The Add-On
Instruction is shown in the Controller Organizer, but the parameters and
local tags for the Add-On Instructions are not viewable on a system that
does not contain the source key used to protect it.
42
Chapter 4
Tip:
When the source key is available, the component behaves the same as if it were not
source protected. To verify source protection, you must disable or remove the
source keys.
Important:
Disabling source protection using the RS5KSrcPT.exe tool does not remove
the sk.dat file.
Use the Clear button on the Source Protection Configuration dialog box.
43
Chapter 4
2. In the Specify Source Key File Location dialog box, select a directory that
does not contain an sk.dat file. For example, the path C:\RSLogix
5000\Projects\Empty.
3. When the message appears and asks if you want to create a new file, click
Yes.
4. When the message appears and asks if you want to create a new directory,
click Yes.
The software now points to an empty sk.dat file. This simulates a user who
does not have the source key on the workstation.
44
Chapter 4
Advantage
Keeping an empty source key file makes it easy to quickly switch back and forth
between sk.dat files for testing.
Disadvantage
You must be careful to use the correct sk.dat file when creating new source keys.
Write down the source keys or make a copy of the sk.dat file and store in a secure location before
deleting the sk.dat file.
Advantage
You can clear the location without removing the sk.dat file.
Disadvantages
Clearing the location does not delete the sk.dat file. The sk.dat file is still present
on the system under its original name and could be discovered.
45
Chapter 4
If you delete the sk.dat file without making a backup copy, you lose the source
keys.
Write down the source keys or make a copy of the sk.dat file and store in a secure location before
deleting the sk.dat file.
Disadvantages
If you delete the sk.dat file without making a backup copy, you lose the source
keys.
You must enable source protection again in order to use the Source Protection
command on the Tools menu.
Removing access to a
protected routine
Write down the source keys or make a copy of the sk.dat file and store in a secure location before
deleting the sk.dat file.
46
Chapter 4
Write down the source keys or make a copy of the sk.dat file and store in a secure location before
deleting the sk.dat file.
47
Chapter 4
48
Chapter 5
Introduction
This chapter describes how to use the Logix CPU Security Tool to lock a
controller. When a controller is locked, no one can access it until it is unlocked.
The Logix CPU Security Tool is automatically installed when you install version
17 or later of the application. If you find that it is not installed, follow these
installation instructions. The installation file is on the installation CD.
Follow these steps to install the Logix CPU Security Tool.
1. On the RSLogix 5000 installation CD, browse to the
D:\ENU\Tools\LogixCPUSecurityTool folder, and then double-click
the RSLogix CPU Security Tool Installer.msi file.
Securing a ControlLogix
controller with the Logix
CPU Security Tool
You can secure a controller with the Logix CPU Security Tool. The tool is
installed on the menu bar on the Logix Designer Tools menu.
1. Click the Start button, then click All Programs, then click Rockwell
Software, then click RSLogix 5000, and then click Logix CPU Security
Tool.
49
Chapter 5
2. In the Logix CPU Security dialog box, click the RSWho button to specify
a path to the controller.
3. Select the controller that you want to secure and click OK.
50
Chapter 5
The Logix CPU Security Tool displays the current status of the controller.
Notice that the controller in the following image is currently unsecured and
there is no password set in the controller.
51
Chapter 5
52
Chapter 5
The Controller Security Status for the controller changes to indicate that
it is secured.
53
Chapter 5
2. In the Who Active dialog box, click the secured controller and click Go
Online.
If you do not have a local copy of the project file on your computer, the
application prompts you to select a file.
54
Chapter 5
4. In the Enter New or Select Existing File dialog box, click the project file
and then click Select.
6. Click OK to continue.
55
Chapter 5
If the project file already exists on your system, an error message appears
that indicates that the controller is secured and you cannot go online.
56
Chapter 5
5. In the Unsecure Controller dialog box, in the Password box, type the
password for the controller and then click Unsecure.
The controller is now unsecured, but the controller still recognizes the
password.
6. Select Exit.
57
Chapter 5
Click Yes to save the change. You can now go online with the controller.
Removing a password
Follow these steps to remove a password.
1. In the Logix CPU Security - DayOfWeek dialog box, click Change
Password.
2. In the Change Password dialog box, remove the '****' empty string and
click OK.
58
Chapter 5
59
Index
A
access
locked controller 53
Add-On Instructions
source protection 31
C
controller
accessing locked files 53
locked 49
organizer import 30
remove security 56
controller resource
apply security 20
CPU Security Tool
install 49
D
delete
source key file 46
directory
FactoryTalk 10
disable
source protection 47
E
emulator
install 11
enable security
RSLogix 5000 11
F
FactoryTalk
directory 10
security 10
Service Platform software 13
file
sk.dat 37
source protection 31
I
import
security server database 25
install
CPU Security Tool 49
emulator 11
FTSP software 13
source protection 31
L
locking controller 49
O
organizer
import result 30
P
password
removal 58
project
protect 11, 25, 31, 49
secure files 14
source protect files 31
protect
project 11, 25, 31, 49
R
remove
password 58
resource
editor 30
routine
source protection 31
RSLogix 5000
enable security 11
secure project file 14
61
Index
S
secure
RSLogix 5000 project 14
security
controller resource 20
FactoryTalk 10
import server database 25
technical support 11
sk.dat
file 37
source key
delete file 46
source protection
disable routine 47
install 31
62
Installation assistance
If you experience a problem within the first 24 hours of installation, review the information that is contained in this manual. You can contact
Customer Support for initial help in getting your product up and running.
United States or Canada
1.440.646.3434
Use the Worldwide Locator available at http://www.rockwellautomation.com/locations, or contact your local Rockwell
Automation representative.
Contact your distributor. You must provide a Customer Support case number (call the phone number above to obtain one) to
your distributor to complete the return process.
Please contact your local Rockwell Automation representative for the return procedure.
Documentation feedback
Your comments will help us serve your documentation needs better. If you have any suggestions on how to improve this document, complete the
feedback form, publication RA-DU002.
Copyright 2014 Rockwell Automation, Inc. All rights reserved. Printed in the U.S.A.