© 2021 AVEVA Group plc and its subsidiaries. All rights reserved. Page 8
Exporting Localization Strings from a Symbol ..................................................................................... 171
Importing the Industrial Graphic Library ............................................................................................ 172
Chapter 9 Securing InTouch ........................................................................... 174
About Securing InTouch .................................................................................................................... 174
InTouch Security Features ................................................................................................................. 174
Configuring an Inactivity Time-Out .......................................................................................................... 175
$InactivityTimeout System Tag............................................................................................................. 177
$InactivityWarning System Tag ............................................................................................................ 177
Locking System Keys ................................................................................................................................. 178
EnableDisableKeys() Function .............................................................................................................. 180
Hiding Menu Items at Run Time ............................................................................................................... 181
Authentication and Authorization Based Security .............................................................................. 183
Comparing Authentication and Authorization ......................................................................................... 183
Different Authentication Security Modes ................................................................................................ 183
Using InTouch-Based Security .............................................................................................................. 183
Using Operating System-Based Security............................................................................................... 184
Using ArchestrA-based Security ........................................................................................................... 184
Using Smart Cards for Authentication ...................................................................................................... 185
Setting up Smart Card Authentication .................................................................................................. 185
Enabling Smart Card Authentication in WindowMaker ....................................................................... 185
Logging on with Your Smart Card ......................................................................................................... 186
Using Secured and Verified Writes ........................................................................................................... 187
Performing a Secured Write ................................................................................................................. 187
Performing a Verified Write ................................................................................................................. 189
Customizing the Secured/Verified Write Dialog Box ............................................................................ 191
Working with the SignedWrite() Function at Run Time ....................................................................... 191
Managing Users and Setting Their Authorization Levels ..................................................................... 192
Configuring InTouch Security Authentication and Authorization ............................................................ 192
Changing an InTouch Operator Password at Run Time ........................................................................... 193
Setting Up Operating System-Based Authentication and Authorization ................................................. 193
Setting Up ArchestrA-Based Security ....................................................................................................... 194
AddPermission() Function ........................................................................................................................ 194
ChangePassword() Function ..................................................................................................................... 195
$AccessLevel System Tag ......................................................................................................................... 196
$ChangePassword System Tag ................................................................................................................. 196
$ConfigureUsers System Tag .................................................................................................................... 197
Logging On and Off ........................................................................................................................... 198
Logging on to an InTouch-Secured Application ........................................................................................ 198
Logging On to an Operating System-Secured Application ....................................................................... 198
Logging On to an ArchestrA-Secured Application .................................................................................... 199
Logging Off from an InTouch Application................................................................................................. 199
Creating a Custom Logon Window ........................................................................................................... 199
PostLogonDialog() Function ..................................................................................................................... 200
LogonCurrentUser() Function................................................................................................................... 200
Logoff() Function ...................................................................................................................................... 201