Siemens SIMATIC RF1100 Operating Instructions Manual page 56

Hide thumbs Also See for SIMATIC RF1100:
Table of Contents

Advertisement

Configuring with the WBM
7.3 The menu items of the WBM
If you lose your administrator password, you must reset the reader to the factory settings as
described in the section "Restoring the factory settings for the hardware (Page 79)".
Roles
In the "Roles" area, you can assign roles to the user profile. Click the relevant check box to
assign the required roles to the user profile. The "Administrator" role has all read/write rights
• Administrator
User profile with all read/write rights
• Read only
Restricted user profile with read rights. With the "User" role, you cannot create new user
profiles or edit other user profiles. Neither can you write to the reader.
Click the "Save" button to save the changes and to create the new user profile.
Auto logoff
In this area, you can define the time period after which you are automatically logged off of
the WBM. This time period expires due to inactivity and is automatically reset to the value
you have set. As soon as the configured time period has expired, the connection to the reader
is automatically disconnected. This ensures that the connection to the reader is not blocked
by an inactive user and is shared with other users.
Authentication
In this area, you can enable/disable authentication. Note that any user has all read/
write privileges (administrator rights) when authentication is disabled. If authentication is
switched on, all users must log on in the login area of the WBM to be able to make changes
in the WBM.
NOTICE
Security recommendation: Authentication
To ensure that no unauthorized persons can access the reader settings, we recommend that
you enable the authentication and create new user profiles. Note that authentication can only
be enabled/disabled by an administrator.
Security settings
You can define the conditions for the password policies, Session Timeout and Brute Force
Prevention (BFP) in the "Security settings" area.
A brute force attack is an attack method in which password-protected access is decrypted
by repeated and systematic entry of user/password variants and combinations based
on powerful computer systems and automated software. With this attack method, an
extremely large number of user/password variants/combinations can be processed with high
performance.
This process is slowed down by Brute Force Prevention (BFP) by limiting the number of
invalid login attempts, whereby the prospects of success of brute force attacks are reduced
significantly. With the SIMATIC Ident devices, the leaky bucket algorithm is used. This means
that the BFP level is increased by the set value on an invalid login attempt. If the BFP level
56
Operating Instructions, 08/2023, C79000-G8976-C698-02
SIMATIC RF1100

Advertisement

Table of Contents
loading

Table of Contents