Configured User Accounts
Configured user accounts are custom user accounts that you configure on your system. Typically, you would create a configured user account for each user of the system.
Each configured user account is represented in the database by a User database item.
In the configuration of the User item, you can define various settings for the user account, including specifying whether the user account is managed directly in ClearSCADA. (If a user account is associated with a Windows User Profile, password management is performed via the relevant Windows domain.) Either way, when a user logs on to the system via the user account, they will need to enter the correct user name and password (the user name is the name you give to the User item).
When a user logs on via user account, they can only access those features that are made available to their user account. A configured user account has the following default permissions:
- The permissions allocated to the built-in ‘Everyone’ User Group, (see Built-In User Accounts).
- The permissions allocated to any configured User Groups of which the user account is a member (see Understanding User Groups). The permissions are allocated to the User Groups on a per item basis in the Security settings of each database item.
- The permissions allocated to the configured user account itself. The permissions are allocated to the User Groups on a per item basis in the Security settings of each database item.
You can also restrict access to certain features via the User Form for each user account. Changing the configuration of a user account does not affect the permissions, but can result in a user being able to access certain features (even if they do have the necessary permissions).
To create and configure a ‘configured’ user account, see Creating a User Account.
NOTE: If a user accesses the system without logging on via a configured user account, they are logged on automatically via one of the Built-In User Accounts.
Further Information
User Accounts for System Users
User Accounts for Third Party Applications
Permissions for Working with User Accounts and User Groups
Allocating Security Permissions