Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Notifications
Login / Register
Community
Community
Notifications
close
  • Forums
  • Knowledge Center
  • Events & Webinars
  • Ideas
  • Blogs
Help
Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Login / Register
Sustainability
Sustainability

Join our "Ask Me About" community webinar on May 20th at 9 AM CET and 5 PM CET to explore cybersecurity and monitoring for Data Center and edge IT. Learn about market trends, cutting-edge technologies, and best practices from industry experts.
Register and secure your Critical IT infrastructure

Fine-grained security for configuration permissions

Geo SCADA and Remote Operations Devices Ideas

Use this portal to submit your innovative ideas to make Geo SCADA Expert and Devices such as SCADAPack, Trio and Realflo of greater value to you and to the SCADA & Telemetry community. Every idea will be individually reviewed by our team for merit and will be marked Under Consideration.

cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • Home
  • Schneider Electric Community
  • Remote Operations
  • Geo SCADA and Remote Operations Devices Ideas
  • Fine-grained security for configuration permissions
Options
  • Subscribe to RSS Feed
  • Mark as New
  • Mark as Read
  • Bookmark
  • Subscribe
  • Email to a Friend
  • Printer Friendly Page
  • Report Inappropriate Content
Invite a Co-worker
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send Invite Cancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Send New Invite Close
Labels
Top Labels
  • Alphabetical
  • SCADA 2
  • ViewX 2
  • Mimics 2
  • SCADAPack 2
  • Scripting 1
  • Virtual ViewX 1
  • Geo SCADA Expert 1
  • Efficiency 1
  • Configuration management 1
  • Modbus to WiStar 1
Idea Statuses
  • Submitted 9
  • Under consideration 126
  • Accepted 1
  • Declined 4
  • Partially delivered 0
  • Delivered 0
  • Abandoned 0
Related Products
Thumbnail of EcoStruxure™ Geo SCADA Expert
Schneider Electric
EcoStruxure™ Geo SCADA Expert
112
Thumbnail of SCADAPack 57x
Schneider Electric
SCADAPack 57x
2
Thumbnail of Accutech
Schneider Electric
Accutech
1
Load more
Completed Ideas
  • Accutech Modbus Master gateway to read Modbus devices and incorporate into WiStar net

  • Controller Key Enhancement

  • Restore "Embed Source Code for Upload" Option in Workbench (SP300 family)

  • DNP Outstation And DNP Master Diagnostics

View All

Invite a Colleague

Found this content useful? Share it with a Colleague!

Invite a Colleague Invite
2 Likes

Fine-grained security for configuration permissions

Status: Under consideration Submitted by Spock BevanWeiss on ‎2020-10-29 04:49 PM
3 Comments (3 New)

We've recently had a customer encounter an issue which destabilised their Geo SCADA Expert system which I can't see a good way to easily overcome.

 

The issue was:

A user with configuration permissions to the database imported an SDE which should not have been imported.

This SDE contained a database backup object, and associated objects which resulted in the backup running quite frequently, and it had the historical data tick boxes ticked, so it consumed large amounts of disk space (on C:\).

The security settings associated with the objects were also such that within the production system that they were deployed in the objects were not visible to any configured users, nor were the objects able to be deleted by anyone other than the superuser account.

 

Given the current security configuration of Geo SCADA Expert, I can't see an easy way to prevent this from occurring, whilst still allowing such 'authorised users' to instantiate new sites, and configure outstation objects / points associated with those new sites.  This is not something that we wish to be purely a SCADA Admin task.

 

So what would be good would be something like one of these options:

1. The ability to only allow certain objects to be created within certain portions of the Database Hierarchy (i.e. we never want anything other than Points / Groups / Outstations / Mimics outside of the !Config / !System groups)

2. The ability to only allow certain objects to be created by certain user groups (i.e. we never want SCADA Integrators to be able to create / configure anything other than Points / Groups / Outstations / Mimics)

 

 

I understand the counter argument is that ALL configuration changes should only be performed by people with appropriate trust / experience to make such damaging changes to the database, however for large systems, it is not always practical to ensure all people are sufficiently experienced.  Some of these customers are deploying up to 80 new sites a week, the amount of labour required to do that means that it can't be all driven in-house by SCADA Admins.  So sectioning off security levels becomes a requirement.

Tags (6)
  • Find more ideas tagged with:
  • english
  • scada
  • SCADA app
  • SCADA software
  • SCADA tutorial
  • Telemetry and SCADA
Comment

Link copied. Please paste this link to share this article on your social media post.

  • Back to Idea Exchange
  • Previous
  • Next
3 Comments
sbeadle
Kirk sbeadle Kirk
Kirk
‎2020-12-21 07:52 AM
  • Mark as Read
  • Mark as New
  • Bookmark
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content
‎2020-12-21 07:52 AM
Status changed to: Under consideration

Thank you. This is particularly noted for larger systems, and because an sde could be imported which is of unknown origin, so could contain unexpected items. It could be needed if a SCADA as a service system was constructed.

 

du5tin
Lt. Commander du5tin
Lt. Commander
‎2021-09-27 04:30 PM
  • Mark as Read
  • Mark as New
  • Bookmark
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content
‎2021-09-27 04:30 PM

We have similar security risks happening with our systems where we configure emailed reports where the user needs to have the report emailed to themselves or if we want to give users the ability to update their own email address or email to text information. To reduce the admin overhead we basically need to give the user permission to configure entire folders or sets of objects when they should only have permission to edit parts of one object. 

 

We did some exploration on how to do this with individual users but eventually had to give authenticated users permission to configure user objects so they could edit their contact info or assign redirection user groups on the fly. 

BevanWeiss
Spock BevanWeiss
Spock
‎2021-09-27 08:55 PM
  • Mark as Read
  • Mark as New
  • Bookmark
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content
‎2021-09-27 08:55 PM

In the situation where the permission change can be sufficiently isolated I've used logic to do the permission escalation.

i.e. a user executes a piece of Logic that updates their phone number / email address etc.

In this way rules can be put against the action to validate / verify it before making the change, and the user doesn't need permissions to configure the object.  They just need Control permission on the Logic (and then the Logic is configured to require Control permissions to execute).

 

But it's still annoying... and it results in a lose of change log details (i.e. the Configuration Change entry shows edited by 'Logic' not the user that actually triggered the action).

Comment
Preview Exit Preview

never-displayed

Hint:
@ links to members, content
 
  • Back to Idea Exchange
  • Previous
  • Next
To The Top!

Forums

  • APC UPS Data Center Backup Solutions
  • EcoStruxure IT
  • EcoStruxure Geo SCADA Expert
  • Metering & Power Quality
  • Schneider Electric Wiser

Knowledge Center

Events & webinars

Ideas

Blogs

Get Started

  • Ask the Community
  • Community Guidelines
  • Community User Guide
  • How-To & Best Practice
  • Experts Leaderboard
  • Contact Support
Brand-Logo
Subscribing is a smart move!
You can subscribe to this board after you log in or create your free account.
Forum-Icon

Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.

Register today for FREE

Register Now

Already have an account? Login

Terms & Conditions Privacy Notice Change your Cookie Settings © 2025 Schneider Electric

This is a heading

With achievable small steps, users progress and continually feel satisfaction in task accomplishment.

Usetiful Onboarding Checklist remembers the progress of every user, allowing them to take bite-sized journeys and continue where they left.

of