Managing CAE user accounts
User privileges can be modified. Users can be added or removed at any time.
Using Cybersecurity Admin Expert (CAE) with EcoStruxure Power Operation is optional.
NOTE: The thick client does not support CAE credentials. Only the WebHMI will recognize CAE credentials.
Recommendations:
- Align usernames and passwords with the limitations of system devices.
- Document and store passwords and usernames in a protected location.
- Assign users only the essential privileges needed to perform their role.
- Revoke user privileges when no longer needed due to a role change, transfer, or termination. User credentials do not expire.
- Have two SecurityAdmin user accounts to reduce the risk of losing security administrator password and access.
- Follow user account management tasks as described by your organization or contact your network administrator.
User account security capabilities include:
- User account lockout criteria after unsuccessful login attempts.
- User account timeouts after session inactivity.
Adding a user account
notice
LOSS of data
Record username and password information in a secure location.
Failure to follow these instructions can result in loss of data.
- Open Cybersecurity Admin Expert.
- Select USER ACCOUNTS tab > Add user account button. The Add new User Account dialog box opens.
- Enter details. Non-alphanumeric characters and spaces are not allowed in names.
- Click Save.
Disabling, editing, or deleting a user account
SecurityAdmin user account can not be deleted.
notice
LOSS of data
Record username and password information in a secure location.
Failure to follow these instructions can result in loss of data.
- Open Cybersecurity Admin Expert.
- Select User Accounts tab > User Accounts:
- Enable or disable user account: click Enable or Disable button.
- Edit user account details: select a user account in the Selection pane, edit details.
- Delete user account: select a user account in the Selection pane, click Enable. If deleting a user account, send and apply configuration to the device. See Configuring CAE cybersecurity for information on sending and applying configuration to a device.