Security Hardening Guide
Security Hardening Guide
Security Hardening Guide
Drivers
Security Hardening Guide
aveva.com
Legal Information
DISCLAIMER
AVEVA Group Plc makes no representations or warranties with respect to this documentation and, to
the maximum extent permitted by law, expressly limits its liability for breach of any warranty that may
be implied to the replacement of this documentation with another. Further, AVEVA Group Plc
reserves the right to revise this publication at any time without incurring an obligation to notify any
person of the revision.
COPYRIGHT
AVEVA gives no express warranties, guarantees or conditions and to the extent permitted under
applicable laws, AVEVA disclaims all implied warranties, including any implied warranties of
merchantability, fitness for a particular purpose or non-infringement of third parties’ intellectual
property rights.
No part of this documentation shall be reproduced, stored in a retrieval system, or transmitted by any
means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written
permission of AVEVA. No liability is assumed with respect to the use of the information contained
herein. Although precaution has been taken in the preparation of this documentation, AVEVA
assumes no responsibility for errors or omissions. The information in this documentation is subject to
change without notice and does not represent a commitment on the part of AVEVA. The software
described in this documentation is furnished under a license agreement. This software may be used
or copied only in accordance with the terms of such license agreement. ArchestrA, Aquis, ArchestrA,
Aquis, Avantis, Citect, DYNSIM, eDNA, EYESIM, InBatch, InduSoft, InStep, IntelaTrac, InTouch,
OASyS, PIPEPHASE, PRiSM, PRO/II, PROVISION, ROMeo, SIM4ME, SimCentral, SimSci,
Skelta, SmartGlance, Spiral Software, Termis, WindowMaker, WindowViewer, and Wonderware
are trademarks of AVEVA and/or its subsidiaries. An extensive listing of AVEVA trademarks can be
found at: https://sw.aveva.com/legal. All other brands may be trademarks of their respective owners.
GENERAL INFORMATION
Some product names used in this documentation are used for identification purposes only and may
be trademarks of their respective companies.
Electrical equipment should be installed, operated, serviced, and maintained only by qualified
personnel. No responsibility is assumed by Aveva Group Plc for any consequences arising out of the
use of this material.
Validity Note
The present documentation is intended for qualified technical personnel responsible for the
implementation, operation and maintenance of the products described. It contains information
necessary for the proper use of the products. However, those who wish to make a more "advanced"
use of our products may find it necessary to consult our nearest distributor in order to obtain additional
information.
The contents of this documentation are not contractual and in no way constitute an
extension to, or restriction of, the contractual warranty clauses.
For information on how to contact sales, customer training, and technical support see
https://sw.aveva.com/contact.
iv
Password Policy 52
Organize your Users and User Groups 53
Configure User Accounts Appropriately 55
Guest User Account and Everyone User Group 57
Disable the Super User Account 58
v
Welcome to the Security Guide
This guide offers advice for setting up Telemetry Server from a security perspective for new
installers and maintainers of Telemetry Server system. The advice contained should be reviewed in
the context of your architecture and security requirements. We recommend that you also take
advice from qualified security experts.
The following chart indicates the key areas of the server that can be used to further enhance the
security of your SCADA system:
Document Scope
This guide explains the concept of Telemetry Server security, including User accounts, User
Groups, and permissions. It also describes the various security settings and provides information on
configuring the security features for your system.
IMPORTANT: This release of AVEVA Telemetry Server Communication Drivers does not
support Alarms, although some references to the Alarm functionality may appear in the Product
and Help.
Boot devices
To reduce the risk of unauthorized access to a server or workstation using various
forms of bootable media (for example, USB devices, PXE Network and CD/DVD’s),
we recommended that you change the permitted boot devices to only enable the
local disk.
Boot Sequence
If more than one single boot device has been enabled, you should ensure that the
boot sequence is correctly configure to give the local disk the highest priority access.
If the CD/DVD drive is required and is enabled as a boot device, you should ensure
that the boot sequence for the CD/DVD drive is configure to a lower priority below
that of the local disk to reduce the risk of unauthorized media running upon start-up.
One-Time boot
We recommended that you disable one-time boot options from the start up menu.
This provides an additional level of security to prevent users from bypassing any
defined boot sequences within the BIOS.
We recommended that you define a Setup password, that is suitably complex, to prevent any
system changes to the BIOS configuration.
NOTE: We recommend that you keep a secure record of BIOS setup passwords in the event
configuration changes need to be made.
Using a password within this setting prevents unauthorized access to the BIOS configuration (and
in some cases the boot menu override), unless correctly entered after any power cycle event.
User management
To further harden access to the Management interface, it is recommended to define
a user name and secure password.
Remote Enabling
With some management interfaces, there are options to allow remote enablement
from a central management server. It is recommended to have this option disabled to
prevent any possibility of a compromised management server gaining access to the
management interfaces of connected systems.
There are various options available for use as a time source for time synchronization. GPS based
time solutions or LAN based (either a firewall or other LAN NTP time source) are generally used as
a reference point, separate from the Corporate or business LAN.
NOTE: If you use a single GPS time source for synchronizing time across a network (such as a
shared time source throughout all network and security layers), we recommend that you have a
secondary alternative time source available for use as a delta comparison with monitoring rules in
place. This is to ensure the integrity of the time signal on the SCADA LAN and that if either source
is compromised or becomes unavailable that sufficient notice is provided to the network
operators, and time skew kept to a minimum.
Depending on the network infrastructure, we recommend that all Domain Controllers are set to
update from an accurate NTP source on a secured LAN, with the domain member machines (Non-
DC Servers or Clients) configured to update from the domain controllers using Group Policy
enforcement.
To configure a Domain Controller to synchronize with an external common time source, you can
either use the command line or modify the registry.
For Virtual environments, the guest has the ability to sync with the local Virtual Server host (such as
those provided with VMWare tools and Hyper-V configurations), but it is best practice and we
recommended that you disable this option on the guest to reduce excessive CPU for committing
time updates.
https://kb.vmware.com/selfservice/microsites/search.do?language=e
n_US&cmd=displayKC&externalId=1318
For Virtual Domain Controllers in Hyper-V environments it is recommended to disable the time
synchronization to the Hyper-V hosts to prevent any issues with time updates that are incorrectly
applied.
https://technet.microsoft.com/en-us/library/d2cae85b-41ac-497f-
8cd1-5fbaa6740ffe(v=ws.10)#deployment_considerations_for_
virtualized_domain_controllers
Implementing Updates
If possible the Windows Operating system should be regularly patched, using the Microsoft
Windows Server Update Service (WSUS), with the latest verified updates from Microsoft.
We recommend the use of a form of pre-production staging area to test updates. This allows you to
verify the installation of a patch and ensure there is a method to revert back to a good point in time
should the patch fail or cause a failure to the machine itself.
NOTE: Due to the nature of SCADA, you may not be able to perform updates live if they require a
server reboot or where certain patches are known to conflict with SCADA processes and
services. Please check the AVEVA Technology Matrix for its compatibility with the latest
Windows Updates.
Check the AVEVA Technology Matrix for the status of Telemetry Server compatibility with the latest
Windows updates.
Windows Firewall comes as a standard feature that can be enabled and configured to provide an
effective, extra level of defense within a network from outside attack. Known protocols, ports,
sources and destinations can be pre-configured within the domain security policy and implemented
throughout the network.
Non-domain based systems would need to be configured manually. This process could be easily
implemented using installation scripts or alternatively the use of a third party endpoint firewall with a
central management console could be more efficient.
NOTE: The additional tools, drivers and services used by a SCADA system can make the
configuration more complex to define at the earlier part of the system design.
If a third party endpoint protection is to be used, then it is recommended to disable the windows
firewall to prevent any possible conflict.
The performance of drives that are allocated for the storage of events or historic data, where they
are under constant change with the addition of files would be severely impacted as a result of the
indexing service constantly re-applying updates to its internal reference database.
You can configure the environment to ensure the Telemetry Server icon remains visible at all times.
You can disable hibernation using the command line, open a command prompt using administrative
privileges and enter the following:
Powercfg.exe –h off
You can also disable the feature from within a Group Policy template, which will be dependent on
the customer requirements and system architecture.
We recommend that you review the system power plan options to ensure that it is set to “High
Performance” to prevent any possibility of power management hindering the system.
NOTE: This is not recommended for every file server. The Balanced (default) profile will be
enough for most cases, with high and constant load being the exception.
Ensure that the “Allow connection only from computers running Remote Desktop with
Network Level Authentication (recommended)” option is enabled as this provides an additional
level of security with Remote Desktop sessions.
Unless there is a specific business requirement, we recommend that you disable the Remote
Assistance option if it was previously enabled to further reduce the attack surface of the machine.
We recommend that the following items should be disabled from each local network
interface installed on the machine. You should check that they are not used or
required as part of the customer architecture.
NOTE: Microsoft does not recommend this change and therefore careful
consideration must be taken into account if you wish to lock down the admin
shares.
To disable the admin shares, you can apply the following registry key setting:
Computer\HKEY_LOCAL_
MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\
Parameters
"AutoShareWks"=dword:00000000
We suggest this is only performed once all the required software installations,
especially AV deployments have been completed as they often require the use of the
ADMIN$ share for file transfer.
"AutoShareWks"=dword:00000001
Computer\HKEY_LOCAL_
MACHINE\SOFTWARE\AVEVA\TelemetryServer\Server
Apply the settings shown below. This removes any MD5 based ciphers from the
available list. MD5 is now considered vulnerable.
Terminal Services
When Terminal Services are used, ensure that the property 'Allow connections
only from computers with NLA' is set.
Most, but not all, of the settings applied are available via local security policy, which could also be
used for standalone machines that are not part of a domain. However, Group Policy provides the
most manageable deployment solution for multiple machines across a network.
We recommend you consult local system administrators for the guidance needed to set this up.
There are various other options common to the Server Group Policies, which will need to be
considered and dependent upon the customer requirements. Some suggestions are provided
below, but the list is not exhaustive.
l Disable LLMNR (Link-Local Multicast Name Resolution) using the setting 'Turn Off Multicast
Name Resolution'
l Disable NBT-NS (Netbios Name Service)
l Disable WPAD (Web Proxy Auto-Discovery Protocol)
l Disable NTLMv1 Authentication
l Set the Windows Logon Cached Logons Count to zero
(HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\CachedLogonsCount).
A sample configuration of services and their start-up state are listed below.
We recommend that you review the permissions of services, particularly those added by third-party
software, and check whether users other than administrators can access them.
We also recommend that service paths are enclosed in quotes. A command to discover these is:
If the 'NT SERVICE\ALL SERVICES' account is not assigned the 'Log on as a service' user
right, the virtual account will not work and an error will be shown in the system log files in
Windows.
Third-party applications that access Telemetry Server will use a configured user account or the
built-in Guest user, depending on whether client security is supported by the Third Party application.
To check that you have the latest version of the Telemetry Server software, Telemetry Server client
software and Telemetry Server service pack:
NOTE: The image shown above is for illustration purposes only. Later versions of Telemetry
Server may be available.
The About dialog box contains contact details for Technical Support and Application
information. The Application information includes details of the product label and version.
l The product label is:
Telemetry Server <Year>R<Release Number>.<Service Pack>[ <Hot Fix> ]
For the optimal security, we recommend that you upgrade the latest version of the Telemetry Server
software with the latest service pack. However, if you choose not to upgrade, you should at least
install the latest service pack for your existing version of Telemetry Server.
The following sections describe the available server architectures and explain how the servers
synchronize and interact with each other.
l Server Label
l Lone Server Architecture
l Hot-Standby Pair Architecture
l Triple Standby Architecture
l Dual Network Servers
NOTE: Multi-server systems (redundancy) are only supported by full versions of Telemetry
Server. You can find information about the version you have installed by running Configurator
and selecting Help>About.
The Server label is used within the system architecture to uniquely identify the server. When
connecting to a partner, the servers exchange label information. Likewise, clients obtain label
information when they poll the server. On a new server, the Server Label defaults to the NetBIOS
name of the machine on which the server is installed, however you can replace this name with a
more meaningful label if required. Server Labels are restricted to 30 characters as they comprise
the names of OPC properties.
Ensure that the Server Label field is populated with a label that is unique to all of the servers on
your system.
When a Configurator client connects to a Telemetry Server, Telemetry Server updates that client's
ServerLabels.xml file to maintain Server Label information about the server(s) to which the client
connects. (The Server Label information might change, for example, if the client's connections
configuration is reconfigured, or the Server Label itself is reconfigured.) The xml file provides a
mechanism to populate the Database Bar on the Configurator client with data about the server to
which the client is currently, or was last, connected. This enables information to be provided about
the server even if the client cannot currently connect to that server.
Telemetry Server also uses the Server Label field to populate the Server Label OPC property
value. In Configurator, you can access this and other OPC properties that relate to server status by
expanding the System Status branch of the OPC Data Bar.
ATTENTION: In order to cache information about the server, write access is required to the
location at which the ServerLabels.xml file is stored on the View. If the user that is logged on to
the Configurator only has read access to this location, Configurator will be unable to cache the
server data. As such, additional Server Label information will only be available for the server to
which the client is currently connected provided that the Configurator is able to poll that server
successfully (as opposed to if the client is currently unable to access that server).
As Lone Server architectures have only one server, there is no redundancy. If there is an
unexpected problem with the server or it loses its connections to the clients or hardware, the
Telemetry Server system will go offline.
NOTE: Multi-server systems (redundancy) require a license and so are only supported by full
versions of Telemetry Server.
In a Hot-Standby Pair, one server acts as the Main server and the other server acts as a Standby
server. The Main server runs the system drivers and acts as the primary server whereas the
Standby server is used as a backup server.
During synchronization, the Main server updates the Standby server. This process provides the
Standby server with data and configuration that accurately represents the data on the Main server.
So, if the Main server goes offline or there is a manual changeover, the Standby server can take
over the duties of the Main server and the system will continue to run.
The diagram above shows a possible Triple Standby architecture, where three servers are
connected via a LAN / WAN. Triple Standby architectures provide additional backup in the event of
a hardware, software or network failure.
When a manual changeover is performed, the Main server will switch to Standby and the Standby
server that has been running the longest amount of time will switch to become the new Main server.
NOTE: Multi-server systems (redundancy) require a license and so are only supported by full
versions of Telemetry Server.
To configure dual networking you can use Telemetry Server's native network sharing feature, or the
configuration features of the operating system and / or network card software. We recommend the
latter, and to do this, you need to use Microsoft Windows Control Panel to configure Network
Connections. In the configuration for each network card, you will need to define:
Telemetry Server DBServer uses a database server port for all native Telemetry Server
communications. This is used to synchronize one server with another server, Configurator client
access, and client API access (for example COM, ODBC, .Net). The default port is 5481. Generally
there’s no reason this should be modified, but it can be changed through the Database Manager,
the Server Configuration Tool, or (while the server is stopped) by altering the following registry key:
HKLM\SOFTWARE\AVEVA\TelemetryServer\DB\Port
NOTE: If you use a non-default database instance, (for example if you are running multiple
Telemetry Server instances on a node), the key becomes:
HKLM\SOFTWARE\AVEVA\TelemetryServer-<instance name>\DB\Port
The server port number needs to match the port number configured on clients in the Configure
Connections utility, and needs to match the port numbers configured on other servers for database
synchronization.
An additional requirement applies if the either end of the connection (server or client) is
running a version of Telemetry Server that is earlier than Telemetry Server 2020 R2. With
such a setup, the Configurator client listens on a separate TCP port to allow the server to connect to
the client and deliver real-time updates. This port must be open for the client to access the server,
and appropriate measures should be taken to allow firewalls to pass this connection through. The
default port range is 5000 – 5009 and can be modified using the Telemetry Server Client Applet.
Recommended security:
l Disable a Telemetry Server user account by disabling the corresponding Windows/LDAP user
account
l Manage the password of a Telemetry Server user account by managing the corresponding
Windows/LDAP user account.
The main benefit of using External Authentication is that it can reduce the amount of time and effort
it takes for IT staff to restrict access via Telemetry Server user accounts. It also means they can
manage password related settings through Windows/LDAP rather than Telemetry Server.
However, using External Authentication can cause minor delays (milliseconds) with connections
and Telemetry Server user account response times.
NOTE: If a user attempts to log on via a Telemetry Server user account that is not configured to
use External Authentication, they only need to enter a user name and password that is valid in
Telemetry Server.
l Server certificates that the Telemetry Server provides to the clients, so that the clients can
verify that the server is a valid Telemetry Server.
l Client certificates that the clients provide to the Telemetry Server, so that the server can
verify that the clients are valid clients.
You can optionally require the client certificates to map to a Windows user account.
We strongly recommend that you set up your system to use trusted certificates to initiate
secure connections and encrypt the data that is transmitted between Telemetry Servers
and clients. To configure your system to use such certificates:
1. Each server and client machine (if client certificates are required) should have its own unique
certificate, which must have a private key associated with it. Obtain the required certificates
from a trusted certification authority and load each certificate into the Windows certificate store
on the relevant machine. (Store the server certificate on the relevant server machine, and the
client certificate on the relevant client machine.) For more information about certificate stores,
see the Windows help.
2. On the server machine, set up the required settings in the Server Configuration Tool (see
'Configure the Connection Security Settings' in the Telemetry Server Guide to Server
Administration).
If the server is in a multi-server system, also configure the security settings that apply for
outgoing server-to-server connections during which this server acts as a client (see
'Connection Security Tab (for Server-to-Server Communications)' in the Telemetry Server
Guide to Server Administration).
Repeat this step on each server in your system.
3. On each client machine, set up the required client connection security for the client (see
'Configure the Client Connection Security Settings' in the Telemetry Server Guide to Client
Administration).
On Telemetry Server systems on which certificates are used:
l If a Telemetry Server that does not have a valid certificate attempts to communicate with
another Telemetry Server on the system (that requires valid server certificates):
l The connection will be declined
l An entry will be logged in the server log file of the server to which the connection attempt
was made. The entry will indicate that the other server did not have a valid certificate (or
has no certificate at all).
WARNING
POTENTIAL SECURITY BREACH
Clients that are running a version of Telemetry Server that is earlier than Telemetry Server 2020
R2 use a different communications protocol and are exempt from requiring valid client
certificates. We recommend that you upgrade all of your clients as soon as it is practicable, to
ensure that they run a version of Telemetry Server that does support client certificates.
Failure to follow these instructions can result in death, serious injury, or equipment
damage. The breach in system security could expose sensitive data and leave the
database vulnerable to unauthorized and potentially malicious use.
Clients that are running a version of Telemetry Server that is earlier than Telemetry Server 2020 R2
are exempt from requiring valid client certificates and can still communicate with a server that has
been updated to require client certificates.
WARNING
POTENTIAL SECURITY BREACH
Failure to follow these instructions can result in death, serious injury, or equipment
damage. The breach in system security could expose sensitive data and the leave the
database vulnerable to unauthorized and potentially malicious use.
To enable some Telemetry Server drivers to communicate more securely with another device or
application, a valid SSL certificate is required. The certificate is used during the communications
establishment phase to initiate a secure connection between Telemetry Server and the other
device. Once the certificate's credentials have been verified, the communications between
Telemetry Server and the other device or application are encrypted.
If an SSL certificate is required, this is specified in the driver-specific guides. If so, you should
purchase a certificate from a trusted Certificate Authority and store that certificate securely. In order
for Telemetry Server to use the certificate, you need to import that certificate into the Telemetry
Server database. To do this, you need to:
1. Create a suitable SSL Certificate database item. Choose whichever type of database item
suits the required security setup:
l SSL Certificate—Used to import a public certificate into the database. The driver can
use this type of certificate to verify that the device or application to which it is connecting
has a trusted certificate.
l SSL Certificate and Key—Used to import a private certificate and matching private key
into the database. This type of certificate enables the server to which Telemetry Server is
connecting to verify Telemetry Server's identity.
SSL Certificate database items are available from the Security branch of the Create New
menu. The configuration Forms of the database items merely contain tabs of properties that
are common to many database items.
2. Use the SSL Certificate database item to import and store the SSL certificate details in the
database (see Import an SSL Certificate into the Database).
3. Reference the SSL Certificate database item from the relevant driver-specific item. This type of
database item varies per driver (see the driver-specific guide for details).
NOTE: SSL certificates are referred to as 'digital certificates' in some third-party documentation.
NOTICE
LOSS OF COMMUNICATION
If Telemetry Server is unable to establish a network connection with a device that uses an SSL
certificate, check that the certificate is valid, has not expired, and has not been revoked. Perform
these checks in addition to those that you would otherwise perform if Telemetry Server is unable
to establish a connection with a device.
WARNING
POTENTIAL SECURITY BREACH
Failure to follow these instructions can result in death, serious injury, or equipment
damage. The breach in system security could expose sensitive data and the leave the
database vulnerable to unauthorized and potentially malicious use.
In order for Telemetry Server to use an SSL certificate, you have to import that certificate into the
database. To do this, you use the Import Certificate pick action on the relevant SSL Certificate
database item (the database item that is used to store the certificate details). The dialog box that is
displayed when you select the pick action varies, depending on the type of SSL Certificate database
item:
l Certificate File Name—Use the browse button to display a File Name window. Use the
window to locate and select the SSL certificate that you want to import into the database.
l Certificate Description—Enter a brief description of the certificate. Use the description to
differentiate between the various SSL certificates that might be imported into the Telemetry
Server database.
NOTICE
LOSS OF COMMUNICATION
If Telemetry Server is unable to establish a network connection with a device that uses an SSL
certificate, check that the certificate is valid, has not expired, and has not been revoked. Perform
these checks in addition to those that you would otherwise perform if Telemetry Server is unable
to establish a connection with a device.
To access the Server Configuration Tool and Server Status Tool, you need to log on via a user
account that has the System Admin permission for the System item ($Root Group). When you first
install Telemetry Server, the built-in Super User has the System Admin permission. As you
configure your system, we recommend that you create user accounts for your system, and allocate
the System Admin permission to one or more of them. You can then remove the Super User.
Check that the Telemetry Server Guest user has appropriate permissions, or none at all if possible.
NOTE: The CACL is an additional security feature and distinct from the Access Control List
(ACL) that is used to define the permissions for each object within the database.
Telemetry Server has settings that enable you to enforce user account security. You can set the
minimum password length, the number of permitted password entry attempts, whether users can
change their own passwords, and so on.
To help protect your system from unauthorized use, we recommend that you change these settings
to suit your security needs. However, you should first consider the implications. You can make your
system more secure from unauthorized access, but user accounts may need more management.
You may need to change passwords more frequently, and there is a chance that users will then
forget their login details (especially if passwords have to include letters and numbers).
Failed password attempts can arise from user action or applications accidentally or maliciously
attempting to log in with incorrect passwords. In the System Configuration tool, you can change the
number of failed password attempts before a user account is disabled.
You can temporarily lock out accounts if multiple password attempts are made in a limited time. You
use this feature to avoid the account being permanently disabled. However, be aware that if a
legitimate user makes repeated login attempts with incorrect passwords, Telemetry Server may
deny them access.
A further feature available from this version is login ‘throttling’ which will slow the login process if it
has failed for a set number of attempts. This feature will not block logins to an account but will help
prevent actors from attempting to use multiple guesses on a password, by restricting the frequency
at which login attempts can be made.
We recommend that you consider whether account disable or lockout is appropriate for your
system, and whether you use the login throttling feature.
When you install Telemetry Server it will, by default, disable account disable and lockout, and will
enable login throttling.
NOTE: There is a client access control list that you should use to prevent attempted login from
clients not designated for login.
You use the Permission Restrictions settings to deny certain permissions at one of four different
levels:
l Server Denied Permissions—To deny access to features from every Configurator client that
is connected to the server. The settings also apply to other types of client that are connected to
the server, such as OPC or ODBC clients, or the Automation Interface.
l Configurator User Denied Permissions—To deny access to features from every
Configurator client that is connected to the server.
l Standard Pick Menu Denied Permissions—To deny access to specific options on the
standard context-sensitive pick action menus that are available on Configurator clients that are
connected to the server. (The pick action menus are also referred to as 'Object menus'.)
By restricting access to permissions on a server-wide basis in this way, you can make your system
more secure by limiting which features are available to clients that connect to Telemetry Server via
specific server(s).
Example:
You may decide that you want your users to be able to issue a control when they log on via
Configurator. To enforce this, you would clear the Control check box in the Configurator User
Denied Permissions settings.
To use the server side permission restrictions effectively, you need to consider the working
procedures of your operators, engineers and administrators. Taking into account their expected
duties, you can restrict their access so that when they log on they can only access the features they
need.
By default on new installations, four permissions are restricted via the Server Denied
Permissions section of the tool (Unacknowledge Alarms, Assign Alarm Responsibility, Off/On
Scan, and Cancel Request). Depending on the role of the installed server, these and other
restrictions may, or may not, be appropriate. We recommend that you assess which permission
restrictions are appropriate for each server, based on its role in your system and the system's
operational requirements, and then configure the required restrictions accordingly.
NOTE: Remember that the settings that you apply using the Server Configuration Tool only apply
to the server on which you have configured those settings. On a multi-server system, you also
need to apply similar settings to the other servers on the system (taking into account the different
roles of those servers, and your system's operational requirements).
We recommend using the Pre-expired check box in the User configuration to define whether the
user of this account is prompted to create a new password the first time they log on via this account.
If you select the Pre-expired check box, the user will be prompted to create a new password; if you
leave the Pre-expired check box clear, the user will not be prompted to create a new password
when they log on, and they will have to use the password defined in the configuration of the user
account.
We recommend that you store your User Accounts, User Groups, and User Patterns in a single
Telemetry Server Group folder. You can then configure the security settings for the Group folder so
that the folder and its contents can only be accessed by a select few members of staff.
NOTICE
SECURITY THREAT
On systems on which Telemetry Server can Create users automatically from group
membership, the incorrect assignment of security permissions on User Patterns and User
Groups can compromise the security of the system. Always restrict the security permissions that
are allocated to User Patterns, and to User Groups that are integrated with Windows domain
groups or LDAP user groups. Only assign those permissions that are actually required, to help
prevent the automatic creation of new user accounts that allow Windows or LDAP users to
perform high-level tasks, such as shutting down the server.
On systems on which the 'Everyone' 'Everyone' User Group is enabled, all User Accounts on
the system automatically inherit the security permissions that are assigned to the 'Everyone'
User Group, including the Guest user (which does not require a logon). Each user's security
permissions comprise: Everyone permissions + User Group permissions + User Account
permissions. To help avoid providing all users with unintended access to features and
functionality that should be restricted, use configured User Groups configured User Groups
rather than the 'Everyone' User Group. If the 'Everyone' User Group has to be used, it MUST be
assigned the minimum permissions required, with access restricted where possible to just the
relevant parts of the database. (On new installations, the built-in 'Everyone' User Group is
inactive and is not assigned any security permissions by default.)
Failure to follow these instructions can result in equipment damage and a breach in
system security.
For more effective security, you should configure the settings for each user account so that they only
provide the required access. Ideally, you should configure a user account so that it only allows the
user of that account to access the features and items they need to perform their expected duties.
For security purposes, the settings you should pay particular attention to are:
Access Type
Allows you to define whether the user can access Telemetry Server via Configurator
User Group
Allows you to associate a user account with one or more User Groups. The user
account will have its own permissions plus those that are allocated to the User Group
(s).
With user accounts that are integrated with Windows or LDAP user accounts, a
user's User Group membership is updated automatically at log in (for those
Telemetry Server User Groups that are integrated with Windows domain groups or
LDAP user groups).
Operational
The Operational settings on the Configurator tab—You can use the check boxes
to control which operator level features are available to the user.
Configuration
The Configuration settings on the Configurator tab—You can use the check
boxes to control which configuration features are available to the user.
Explorer Bars
The Explorer Bars settings on the Configurator tab—You can use the check
boxes to control which Explorer Bars (navigation hierarchies, such as the Database
Bar) are available to the user.
The user-specific security settings that are on the Security tab (only available if the
Allow per User option is enabled at the server, and the user accounts are managed
directly in Telemetry Server, rather than via the Windows User Authentication
feature). You can use the Security settings to define the password length, password
strength, password expiry, and so on, for the user account.
NOTE: External authentication using Windows Active Directory or LDAP extends the capability
of Telemetry Server by transferring password and optionally user account management to an
external system.
On systems on which the 'Everyone' 'Everyone' User Group is enabled, all User Accounts on
the system automatically inherit the security permissions that are assigned to the 'Everyone'
User Group, including the Guest user (which does not require a logon). Each user's security
permissions comprise: Everyone permissions + User Group permissions + User Account
permissions. To help avoid providing all users with unintended access to features and
functionality that should be restricted, use configured User Groups configured User Groups
rather than the 'Everyone' User Group. If the 'Everyone' User Group has to be used, it MUST be
assigned the minimum permissions required, with access restricted where possible to just the
relevant parts of the database. (On new installations, the built-in 'Everyone' User Group is
inactive and is not assigned any security permissions by default.)
Failure to follow these instructions can result in equipment damage and a breach in
system security.
Telemetry Server has a single built-in User Group named Everyone. Every user account that is
created is automatically associated with the 'Everyone' User Group, including the Guest user (which
does not require a logon). On new installations, the 'Everyone' User Group is inactive and is not
assigned any security permissions by default.
The Guest user account and Everyone user group should not be used. Instead, you should add
'configured' User Accounts and User Groups to the system and grant them the relevant security
access and privileges. This provides greater flexibility and control over the functionality and features
to which individual users, or groups of users, have access.
NOTE: Some third-party applications such as OPC clients that do not support 'OPC Private
Security' will need to use the Guest user to access Telemetry Server. They require the Guest user
account to have at least the Read permission so that they can access system data. This
permission can be applied just to the objects which the application needs to read.
While the Super User account can be useful, it does pose a security risk to your system - if an
unauthorized user were to discover the user name and password for the Super User, they would
have access to your entire system. For this reason, we recommend that once your system has been
set up and is running, you disable the Super User account.
NOTE: If a user encounters difficulties when trying to access the system at a later date, the Super
User can be enabled again and used to alter the security settings. To do this the installation kit
needs to be re-run on the server node. A further use is that it may also be necessary to use the
Super User account to correct the security settings for imported groups which had their own
security settings and refer to users not present in the database.
To disable the Super User account, you can use the Change Super-User dialog box.
AVEVA
HIGH CROSS MADINGLEY ROAD
CAMBRIDGE CB3 0HB
TEL +44 (0)1223 556655
FAX +44 (0)1223 556666
AVEVA.COM