Command: Security Screen
Symbol:
Function: The command opens the Security Screen view.
Call:
View Menu
icon or
in the status bar
The icon is displayed in blue when a valid certificate is specified for the digital signature. When only one client certificate is specified for the encrypted communication, the icon remains gray, resulting in the client certificate providing no increased security for the user.
Personal user certificate
Encrypted Communication
Encryption and signatures of IEC projects
Encryption and signature of download, online change, and boot application
Security level
Important
When the Security Screen is opened and closed again, the current settings are applied in the user options, even when no active changes have been made.
Tip
If the CODESYS Security Agent add-on product is installed, then the Security Screen view provides an additional Devices tab. This allows for the configuration of certificates for the encrypted communication with controllers.
Tab: Users
On this tab, certificates are configured which are required for the encrypted communication and the digital signature of the user. Only certificates with private keys can be specified here. The user profile is saved as an XML file in the user options.
User Profile and Certificate Selection | By default, the login name for Windows is specified as the user profile. |
List box with existing user profiles |
Here you specify the name for a new user profile.
This user profile is no longer displayed in the list box. |
Digital Signature |
One certificate can be selected. The certificate has to have a private key.
One certificate can be selected. The certificate has to have a private key. |
Project File Decryption |
One certificate can be selected. The certificate has to have a private key.
|
For more information, see: Certificate Selection
Activate the Use of Certificates for Enhanced Security | |
Enforce encrypted communication |
|
Enforce encryption of project files |
To open this project, the certificate to be encrypted has to be specified in Project File Decryption with a private key. |
Enforce signing of project files |
When a project is saved, a signature file ( |
Enforce encryption of downloads, online changes and boot applications |
This certificate is defined directly, either in the properties dialog of the application on the Encryption tab, or on the Project tab, in the Encryption of Boot Application, Download and Online Change group. Controller certificates are located in the local Windows Certificate Store in the PLC Certificates directory. If the certificates of your controller are not available in the directory, then they first have to be loaded from the controller and installed to the directory. For these instructions, see the "Controller Certificates" chapter. For more information, see: Protecting an Application |
Enforce signing of downloads, online changes and boot applications |
For more information, see: Protecting an Application |
Enforce signing of compiled libraries |
. Requirements
Enforce timestamping of signed compiled libraries
Example: For more information, see: Save Project as Compiled Library |
Tab: Project
All project-specific settings are configured on this tab. These elements are active only when a primary project is loaded.
Project file encryption | |
Technology |
When you select the Encryption project setting and then select Certificates in the dialog, you can click |
Certificates of Users Sharing this Project | Area for listing the certificates that encrypt the project file |
Encryption of Boot Application, Download and Online Change | |
List of applications of the controller | Double-clicking an application in the list opens the Security Level on the User tab of the Security Screen: dialog. The following fields are available in the open properties dialog, depending on the settings of the
In the Controller certificates are located in the local Windows Certificate Store in the PLC Certificates directory. If the certificates of your controller are not available in the directory, then they first have to be loaded from the controller and installed to the directory. For these instructions, see the Protecting and Saving a Project – Encryption with Certificates chapter. For more information, see: Protecting an Application |
For more information, see: Encrypting a project with a certificate
Tab: Devices
Tip
This tab is available only after you have installed the CODESYS Security Agent add-on. For more information, see: Security Screen: Devices in the CODESYS Security Agent help.