Jump to main content
SIMATIC WinCC Open Architecture Version 3.19 Documentation
  • Highlights & Release Notes
  • WinCC OA Getting Started - Tutorial
  • DemoApplication
  • Installation
  • Project Administration
  • Mass configuration
  • Module PARA
  • Graphics Editor (GEDI)
  • System Management
  • User Interface
  • CONTROL
  • Multilingual Projects
  • Add-ons
  • Special Functions
  • Drivers
  • Diagnostics
  • Reference Tables
  • Security
  • Product Information
  • Videos & Tutorials
  • Support & Services
  1. Home
  2. Security

    Go beyond the norm in cybersecurity.

  3. Security Features

    Maintaining the control over production and the processes in the application has the highest priority in automation. Even measures to prevent security threats must not affect this.

  4. Authentication via Kerberos, basics

    In a more and more networking world, a WinCC OA system could be exposed to different types of attacks. An unauthorized WinCC OA system could connect to the distribution manager or hackers could try to manipulate WinCC OA messages.

  5. Possible config entries for Kerberos
  • Security

    Go beyond the norm in cybersecurity.

    • Security Features

      Maintaining the control over production and the processes in the application has the highest priority in automation. Even measures to prevent security threats must not affect this.

      • Authorization Concept
      • Certificates
      • Login
      • Login Framework

        The WinCC OA login framework provides a framework that is easy to extend. The WinCC OA login panels can be easily replaced by user-specific panels without having to re-implement the functionality.

      • Server Side Authentication
      • User-defined Login
      • Authentication via Kerberos, basics

        In a more and more networking world, a WinCC OA system could be exposed to different types of attacks. An unauthorized WinCC OA system could connect to the distribution manager or hackers could try to manipulate WinCC OA messages.

        • Authentication via Kerberos, basics

          In a more and more networking world, a WinCC OA system could be exposed to different types of attacks. An unauthorized WinCC OA system could connect to the distribution manager or hackers could try to manipulate WinCC OA messages.

        • Requirements and Configuration
        • Possible config entries for Kerberos
      • Basics on Encryption
    • Multiplexing Proxy

      The WinCC OA Multiplexing Proxy Manager is used to increase the security of your WinCC OA projects.

    • Further References

Possible config entries for Kerberos

Config entries are necessary for the use of the secured authentication through Kerberos. This chapter lists the necessary config entries:

[event]

  • createUsersAllowed

  • updateUsersAllowed

[general]

  • kerberosRootGroup

  • kerberosSecurity

SIMATIC WinCC Open Architecture Version 3.19.18 - © ETM professional control GmbH - ✉ documentation@etm.at | | | - Privacy Policy - Cookie Policy - Terms of use