Tech Note 999 - Wonderware Application Server Security Troubleshooting Essentials Part 2 Security Classification & Operational Permissions
Tech Note 999 - Wonderware Application Server Security Troubleshooting Essentials Part 2 Security Classification & Operational Permissions
All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information.
Topic#: 002829
Created: December 2013
Introduction
This Essentials Guide is the 2nd in a projected series.
This Tech Note discusses the relationship between the Security Groups and Attribute Security Classification. In addition, we introduce a
utility which unifies the security group information covered in this Tech Note into a single page and provides Galaxy search functionality
as well.
Application Versions
Wonderware Application Server 2012 and later
In a real world Galaxy, there are typically a large amount of AA Objects. Roles and Security Groups functionality provides the ability to
efficiently assign/modify users and their associated security classification on the attributes of AA Objects.
Roles: Generalize users' functional groups, such as Operator, System Engineer, Application Engineer, etc. One Role can be granted
permissions to multiple Security Groups.
Security Group: Groups AA Objects together with those that have same set of Operational Permissions.
The following table shows the AA Object Attributes' Security classification specifications and their corresponding Security Groups'
Operational permissions.
Security Operational
Perspective
Classification Permission
FreeAccess No privileges are required. Any user can write to an attribute that has this setting
Allows user to change the value of an attribute during On-Scan or Off-Scan mode Note: Deployment needs the Operate
Operate Operate
Operational Permission
Secured Write Requires the logon user to retype password in order to make the changed value go through. Operate
Besides the above Secured Write, you must provide the second user's authentication.
Verified Write Operate, Verify
Note: Two users must have Operate and Verify Operational permissions.
Tune Allows user to write a value to the attribute at the On-Scan or Off-Scan mode. Tune
Configure Allows user to write a value to the attribute only at the Off-Scan mode. Configure
Read Only Regardless of user's permission, the attribute value cannot be changed at Runtime.
The following graphic shows Security classifications in the center red frame, and the Operational permissions at the right.
The following section demonstrates usage of Operate, Secured Write and Configure specifications in detail.
Operate
file:///C|/inetpub/wwwroot/t002829/t002829.htm[12/17/2013 9:52:41 AM]
Application Server Security Troubleshooting Essentials Part 2: Security Classification & Operational Permissions
Allows user to change the value of an attribute during On-Scan or Off-Scan mode.
Environment
Role OperateRole
User OperA
Setup
1. Only OperateRole is granted the access to GroupOperator.
Verify
1. Deploy UDO4Test_Operate with Off-Scan and open it with the Object Viewer. The object icon in this example indicates the
2. Change the User to OperA and set the value on UDA_Operate to False (Figure 5 below).
FIgurE 6: ADmINIstratOr CaNNOt SEt tHE UDA_OPEratE VaLuE: ADmINIstratOr Is NOt IN OPEratEROLE
Summary
Operate Security Classification can set attribute value in both On-Scan and Off-Scan deployments if the user is in the correct Role.
Secured Write
Requires the logon user to type the password in order to make the changed value goes through. The Operate Permission is required.
Environment
Role SecuredWriteRole.
User OperB_Sec
Setup 1
1. Only SecuredWriteRole is granted the access to GroupSecuredWrite.
Setup 2
Same as the Setup 1 but uncheck Operate Operational permission from GroupSecuredWrite.
Verify 1
1. Deploy UDA4Test_SecuredWrite (AA Object) and open it with Object Viewer.
FIgurE 7: AftEr CLICKINg tHE OK ButtON IN tHE "ENtEr UsErNamE aND PasswOrD" DIaLOg, tHE VaLuE Of UDA_SECurEDWrItE SEts tO TruE
SuCCEssfuLLY
FIgurE 8: THE SECurED WrItE SECurItY CLassIfICatION DENIEs tHE WrItE REQuEst: UsEr ADmINIstratOr Is NOT IN SECurEDWrItEROLE
Verify 2
Summary
Secured Write Security Classification needs the Operate Operational permission even if the user is in the correct Role.
Configure
Allows the user to write a value to the attribute only at the Off-Scan mode.
Environment
Role ConfigureRole.
User ConfigUser
Setup
1. ConfigureRole is granted the access to GroupConfigure.
Verify
1. Open UDO4Test_Configure (AA Object) in the Object Viewer.
Summary
Configure Security Classification only works while in Off-Scan Deployment state.
GRSecurityLayout Utility
This Read-Only Utility provides a quick way to view and search the Galaxy Security Settings on Security Groups with AA Objects and
Operational permissions, Roles and Users, within a single page.
Note: This Utility is developed with Wonderware Galaxy Repository Access (GRAccess) Toolkit. Therefore, like the IDE, running this
Utility will consume one Dev_Session_Count License Feature count which is listed in ArchestrA.lic. The Utility's main functions are as
follows:
file:///C|/inetpub/wwwroot/t002829/t002829.htm[12/17/2013 9:52:41 AM]
Application Server Security Troubleshooting Essentials Part 2: Security Classification & Operational Permissions
Galaxy User Oriented Tree-View: Shows each Galaxy user's Runtime Security Relationships.
Wildcard Search AA Objects and their belonging Security Groups: In a real world Galaxy, there are usually a large number of
AA Objects. Quickly finding any AA Object's associated Security Groups is very important during the Security Design and
file:///C|/inetpub/wwwroot/t002829/t002829.htm[12/17/2013 9:52:41 AM]
Application Server Security Troubleshooting Essentials Part 2: Security Classification & Operational Permissions
Verification procedures.
FIgurE 14: WILDCarD SEarCH REturNs SECurItY GrOuP LIst THat CONtaINs ALL AA OBJECts CONtaININg tHE VaLuE
Search the Users and Security Groups that have the given Operational permission.
In Figure 15 (below), we search all the Security Groups that contain the Configure Operational permission and the users in these
file:///C|/inetpub/wwwroot/t002829/t002829.htm[12/17/2013 9:52:41 AM]
Application Server Security Troubleshooting Essentials Part 2: Security Classification & Operational Permissions
Security Groups.
Search the Users and Security Groups that do not have the given Operational permission.
In Figure 16 (below), we search all the Security Groups that do not contain the Configure Operational permission and the users in
file:///C|/inetpub/wwwroot/t002829/t002829.htm[12/17/2013 9:52:41 AM]
Application Server Security Troubleshooting Essentials Part 2: Security Classification & Operational Permissions
these Security Groups.
The "-" (dash character) in the search criteria means Not Contain.
Quick retrieve AA Objects, Templates and Instances, within any selected Security Group.
file:///C|/inetpub/wwwroot/t002829/t002829.htm[12/17/2013 9:52:41 AM]
Application Server Security Troubleshooting Essentials Part 2: Security Classification & Operational Permissions
FIgurE 17: HIgHLIgHt ANY SECurItY GrOuP LEVEL IN tHE TrEE VIEw tO sEE tHE CONtaINED AA OBJECts (TEmPLatE Or INstaNCE)
Quick retrieve AA Objects' attribute names and their corresponding Security Classification (Figure 18 below).
FIgurE 18: AA OBJECt, UDO4TEst_SECurEDWrItE's AttrIButE NamEs, aND COrrEsPONDINg SECurItY CLassIfICatION
References
Wonderware Application Server 2012 R2 – IDE.PDF
Tech Notes are published occasionally by Wonderware Technical Support. Publisher: Invensys Systems, Inc., 26561 Rancho Parkway South, Lake Forest, CA 92630. There is also
technical information on our software products at Wonderware Technical Support.
Back to top
©2013 Invensys Systems, Inc. All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form or by any means, electronic or
mechanical, including photocopying, recording, broadcasting, or by any information storage and retrieval system, without permission in writing from Invensys Systems, Inc.
Terms of Use.