■1. Function setting
(1) Function setting
The functions for the operator information can be set.
The following items can be set.
Automatic logout time
Password expiration date
Initial position input
Valid byte count input
Upon login failure, prohibit login
for a set period of time
Upon login failure, lock the
Check password requirements
Set minimum password length
Set password character type
2 - 96
2.15 Operator Authentication
The authentication method can be switched. ([Operator name + password],
[External auth (general)])
When [External auth (general)] is selected, the [Enable operator name/pswd
authentication] check box appears.
The time from when the last time the GOT is operated until when you
automatically log out of the GOT can be set. (1 to 60 minutes, 0 is invalid.)
Set the item for regularly changing the password to be used for the operator
authentication. (1 to 1000 days, 0 is invalid.)
When the password is out of date after setting the password, the GOT
requests the password change.
When the number of remaining days is equal to or less than the set number of
days, the password expiration date is notified. (1 to 30 days, 0 is invalid.)
Set the initial position input (byte count) of external authentication ID from
among the data read from the external authentication device. (0 to 1998 bytes)
Set the valid byte count for external authentication ID. (2 to 16 bytes)
Set the continuous failure count to block login. (3 to 10 times, 0: invalid)
Set the prohibition time. (1 to 3600 seconds)
Set the continuous failure count to lock an operator ID. (3 to 10 times, 0:
Set whether to check the number of characters and the character type.
Set the minimum length of the password. (1 to 32 characters)
Set the character type to be included in the password.
• [No check]: No character types are checked.
• [A-Z, a-z]/[1-9, Other]: Checks if alphabets and other characters are
• [A-Z, a-z]/1-9/Other: Checks if alphabets, numbers, and other characters
• A-Z/a-z/0-9/Other: Checks if uppercase alphabets, lowercase alphabets,
numbers, and other characters are included.
1) Authentication method
2) Automatic logout time
3) Password expiration date
4) Adv. notification
5) Initial position
6) Valid byte count input
7) Continuous failure count
8) Prohibition time
9) Continuous failure count
10) Set password requirements