![](/images/new-backgrounds/1188845/18884519x1.webp)
Section 2.2 Access Control
The OmniLink control has several parameters or operations that have limited access. In regards to the auto setup module the ability to perform the actions of resetting faults or changing limits must be restricted to certain personnel. The OmniLink control provides several means to limit access to these parameters or operations. These parameters and operations are called restricted items.
The OmniLink control employs combinations of two different means to limit access to restricted items. These means are the RUN/PROG key switch on the operator terminal and a user password system. The user password system assigns names and passwords to up to sixteen users. These two means can be used alone or in combination with each other. When a user employs the proper means to gain access, he will have the ability to perform the actions and change the parameters which have been designated to his control.
There are four possible modes of operation for the restricted access system. They are the “Key Only” mode, the “Key or Password” mode, the “Password Only” mode, and the “Key and Password” mode. The control can be configured to operate in any one of these four modes.
Section 2.2.1 Key Only Mode
The “Key Only” mode is the least complex of the four modes. This mode employs the RUN/PROG key as the only means to limit access to restricted items. Any user with the RUN/PROG key can access all of the restricted items. Without the RUN/PROG key, user access to all of the restricted items is prohibited.
Although the “Key Only” mode has the advantage of being easy to use, it does have a disadvantage. This mode cannot give a particular user access to only some of the restricted items. When operating in this mode, any user with the RUN/PROG key will have access to all of the restricted items.
Section 2.2.2 Key or Password Mode
The key or password mode allows for either of two means to gain access to the restricted items. A user with RUN/PROG key can access all of the restricted items. A user with the correct password can access the restricted items that have been designated for that particular user only. The system allows for passwords to be assigned to sixteen users. Each user can be assigned access to any or all of the restricted items.
The following is an example of a “Key or Password” mode operation. The RUN/PROG key is given to the die
April 17, 2000 Man ual Versio n 1.0 | 2.3 |