



NOTICE

Recommendations regarding data security
In order to minimize the risk of data security violations, we recommend the following organizational and technical actions for the system where your applications are running. Whenever possible, avoid exposing the PLC and control networks to open networks and the Internet. Use additional data link layers for protection, such as a VPN for teleaccess, and install firewall mechanisms. Restrict access to authorized persons only, and change any existing default passwords during the initial commissioning, and change them regularly.




NOTICE

Detailed information on the concept and use of device user management is provided in "Handling of Device User Management".
There you will also find the following instructions on how to use the editor:
-
First-time login to the controller for editing and viewing its user management
-
Setting up a new user in the user management of the controller
-
Changing of access rights to controller objects in the user management of the controller
-
Loading user management from a *.dum file, modifying it, and downloading it to the controller in offline mode
On this tab of the device editor, you define the device access rights of device users to objects on the controller. As in the project user management, users must be members of at least one user group and only user groups can be granted certain access rights.
Requirements for the “Access Rights” tab to be displayed:
-
In the CODESYS options, in the “Device Editor” category, the “Show access rights page” option has to be selected.
Note that this CODESYS option can be overwritten by the device description.
Requirements for the access rights to be granted to user groups
-
A component for the user management has to be available on the controller. That is the primary requirement.
-
Users and user groups have to be configured on the “Users and Groups” tab.
|
Switches on and off the synchronization between the editor and the user management on the device. If the button is not pressed, then the editor is blank or it contains a configuration that you loaded from the hard disk. When the button is pressed, CODESYS synchronizes the display in the editor continuously with the current user management on the connected device. When you enable the synchronization while the editor contains a user configuration that is not synchronized with the device yet, you are prompted what should happen to the editor contents. Options:
|
|
CAUTION: The import of a device user management by means of a
|
|
|
“Device user” |
User name of the user currently logged in on the device |
In the tree structure, the objects are listed to which actions can be executed at runtime. The objects are each assigned by their object source and partially sorted in object groups. In the “Rights” view, you can configure the access options for a user group to a selected object. |
Object source (root node)
A description of the objects is located in the table. ⮫ “Overview of the objects” |
Object groups and objects (indented) Example: “Device” with child nodes “Logger”, “PlcLogic”, “Settings”, “UserManagement”. |
In general, the access rights are inherited from the root object (also “Device” or “/” to the subobjects. This means that if a permission of a user group is denied or explicitly granted to a parent object, then this first affects all child objects. The table applies for the object that is currently selected in the tree. For every user group, it shows the rights currently configured for the possible actions on this object. ![]() Possible actions on the object:
|
|
When an object is clicked, a table on the right side shows the access rights of the available user groups for the selected object. This allows you to quickly see:
Meanings of the symbols
Change the permission by clicking the symbol. |
Example
The “Logger” object on the “Access Rights” tab was created by the "Logger" component and controls its access rights. It is located directly below the “Device” runtime object.
The possible access rights for this object can be granted only for the “View” action.

Initially, each object has a read access. This means that every user can read the "Logger" of a controller. If this access right should be denied for a single user group (“Service” in the example), then the read access to the logger object has to be denied explicitly.

Overview of the objects
“Runtime objects Device” |
||||||
“Logger” |
Online access to the logger is read only. Therefore, only the “View” access right can be granted or denied here. |
|||||
“PlcLogic” |
All IEC applications are inserted here automatically as child objects during download. When an application is deleted, it is removed automatically. This allows specific control of online access to the application. Access rights can be assigned centrally over all applications in the “PlcLogic” The “Administrator” and “Developer” user groups have full access to the IEC applications. The “Service” and “Watch” user groups only have read access (for example for read-only monitoring of values). |
|||||
The following table shows which action is affected in particular when a specific access right is granted for an IEC application.
|
||||||
“Application” |
Operation |
Access Rights |
||||
“Add/Remove” |
“Execute” |
“Modify” |
“View” |
|||
Login |
|
|
|
|
||
Create |
|
|
|
|
||
Create child object |
|
|
|
|
||
Delete |
|
|
|
|
||
Download / online change |
|
|
|
|
||
Create Boot Application |
|
|
|
|
||
Read variable |
|
|
|
|
||
Write Variable |
|
|
|
|
||
Force variable |
|
|
|
|
||
Set and delete breakpoint |
|
|
|
|
||
Set Next Statement |
|
|
|
|
||
Read call stack |
|
|
|
|
||
Single cycle |
|
|
|
|
||
Switch on flow control |
|
|
|
|
||
Start / Stop |
|
|
|
|
||
Reset |
|
|
|
|
||
Restore retain variables |
|
|
|
|
||
Save retain variables |
|
|
|
|
||
“PlcShell” |
Only the “Modify” permission is evaluated at this time. This means that only when the “Modify” permission has been granted to a user group can PLC shell commands also be evaluated. |
|||||
“RemoteConnections” |
Additional external connections to the controller can be configured below this node. Currently, access to the CODESYS OPC UA server can be configured here. |
|||||
“Settings” |
This is the online access to the configuration settings of a controller. By default, access to “Modify” is granted only to the administrator. |
|||||
“UserManagement” |
This is the online access to the user management of a controller. By default, read/write access is granted only to the administrator. |
|||||
“X509” |
This controls the online access to the X.509 certificates. Two types of access are distinguished here:
Every operation is assigned to one of these two access rights. Each operation is inserted as a child object below X509. Therefore, access per operation can now be fine-tuned even more. |
|||||
“File system objects /” |
||||||
All folders from the execution path of the controller are inserted below the "“/”" file system object. This allows you to grant specific rights to each folder of the file system. |