Jump to main content
WinCC OA Documentation
WinCC OA Documentation
LANG
  • Version Information
  • Concepts
  • Deployment
  • Security
  • Engineering
  • Data Management
  • Business Logic / Control
  • Data Visualization
  • Southbound Interfaces
  • Northbound Interfaces
  • Web Connectivity / Network Interfaces
  • User Management
  • Availability
  • Reporting
  • Addons
  • Reference Tables
  • Videos & Tutorials
  • Documentation
  • Support & Services
  • Disclaimer
  1. Home
  2. User Management

    All about authorization, authentication and login-customization.

  3. Authentication via Kerberos, basics

    In a more and more networking world, a WinCC OA system could be exposed to different types of attacks. An unauthorized WinCC OA system could connect to the distribution manager or hackers could try to manipulate WinCC OA messages.

  4. Possible config entries for Kerberos
  • Version Information

    Release Notes, Update information, Certifications and Frequently Asked Questions.

  • Concepts

    Your first step into modern and powerful process visualization.

  • Deployment

    Topics you need to know before using WinCC OA.

  • Security

    Go beyond the norm in cybersecurity.

  • Engineering

    Powerful tools for easy or complex engineering tasks.

  • Data Management

    Classify, structure and archive your data.

  • Business Logic / Control

    Endless possibilities in data processing for your projects.

  • Data Visualization

    User interfaces, Trends and Reports for every purpose and device.

  • Southbound Interfaces

    The process connection to the actual machines/sensors.

  • Northbound Interfaces

    Your portal to the cloud or supervising systems.

  • Web Connectivity / Network Interfaces

    Data exchange, APIs and web technologies

  • User Management

    All about authorization, authentication and login-customization.

    • User Administration

      The WinCC OA user administration provides important features for controlling users that use the system. Security is an important issue in the automation technology when controlling highly sensitive systems and it is of utmost importance that the users of the system have only access to the specified area of operation. With the WinCC OA user administration, you can administer users so that they can use the resources effectively without inflicting damage to the system inadvertently or otherwise

    • Device Management

      The Device Management allows you to define which WinCC OA UI connections (mobile application and Desktop UI) are allowed to connect to your project. Additionally a direct overview over the available licenses and currently connected devices is shown.

    • Inactivity/AutoLogout

      The inactivity management in WinCC OA prevents not authorized persons or persons with a wrong identity to use a workplace for forbidden or not traceable operations.

    • Access Control Plug-in

      The WinCC OA Access Control Plug-in can be used to control the access to data points (read, write, display) via user rights.

    • Authorization Check Plug-in

      The authorization check plug-in allows setting access rights on data point element level (data point values).

    • Authentication via Kerberos, basics

      In a more and more networking world, a WinCC OA system could be exposed to different types of attacks. An unauthorized WinCC OA system could connect to the distribution manager or hackers could try to manipulate WinCC OA messages.

      • Authentication via Kerberos, basics

        In a more and more networking world, a WinCC OA system could be exposed to different types of attacks. An unauthorized WinCC OA system could connect to the distribution manager or hackers could try to manipulate WinCC OA messages.

      • Requirements and Configuration
      • Possible config entries for Kerberos
    • Login Framework

      The WinCC OA login framework provides a framework that is easy to extend. The WinCC OA login panels can be easily replaced by user-specific panels without having to re-implement the functionality.

    • System Use Notification

      You can use the system use notification panel to display an instruction to the user when logging into the WinCC OA system. The user must confirm the notification before logging into the WinCC OA project.

    • Audit Trail panel
  • Availability

    How to get your system uptime to the maximum.

  • Reporting

    Create state of the art project reports without limits.

  • Addons

    Useful tools and enhancements for special demands.

  • Reference Tables

    Detailed and extensive content for special project adaptation.

  • Videos & Tutorials

    Explore the capabilities of WinCC OA with our carefully selected collection of video tutorials and guides.

  • Documentation

    Basic information about terms and functions within the documentation.

  • Support & Services

    An experienced team of support agents, consultants and trainers are ready to facilitate active partnerships with our customers, so they can profit from our comprehensive service.

  • Disclaimer

    A brief clarification of liability exclusions or legal notices.

Possible config entries for Kerberos

Config entries are necessary for the use of the secured authentication through Kerberos. This chapter lists the necessary config entries:

[event]

  • createUsersAllowed

  • updateUsersAllowed

[general]

  • kerberosRootGroup

  • kerberosSecurity

SIMATIC WinCC Open Architecture Version 3.20.7 - © ETM professional control GmbH - | | | - Privacy Policy - Cookie Policy - Terms of use - Whistleblowing - Imprint