All Units
Introduction
Core Concepts
Data Connectivity
Dashboard Visualization
Clients
Data Historian
Asset Organization
Alarming & Notifications
Helper Modules
Security
Cloud & IoT
Reporting
Automated Transactions
Business Intelligence
Project Management
Fault Detection & Diagnostics
SPC/SQC Analysis
Energy Analysis
Security
Total: ~11 min
Many of the applications designed with the ICONICS Suite will be handling sensitive data on a regular basis, so it is important to have a competent security model built around the client access to that data. The Security Server will be responsible for housing the user and group configurations, but there are many other aspects to competently securing a dashboard.
Adding a Login Control to a Display
Adding a login control directly to a display, which can often be the easiest means of interacting with security in the ICONICS system.
Modifying the File Access Denied Page
Take control of how the default login screen looks, customizing it to suit your needs. Including examples for login screens on both GraphWorX64 and HTML5 displays.
Security with Simultaneous Logins
Setting up systems to support multiple simultaneous users being logged in, and the additional permission ramifications that come with it.
English
Czech
German
French
Italian
Japanese
Polish