Logix 5000 Controllers Security: Programming Manual
Logix 5000 Controllers Security: Programming Manual
Activities including installation, adjustments, putting into service, use, assembly, disassembly, and maintenance are required to be carried out by
suitably trained personnel in accordance with applicable code of practice. If this equipment is used in a manner not specified by the manufacturer,
the protection provided by the equipment may be impaired.
In no event will Rockwell Automation, Inc. be responsible or liable for indirect or consequential damages resulting from the use or application of this
equipment.
The examples and diagrams in this manual are included solely for illustrative purposes. Because of the many variables and requirements associated
with any particular installation, Rockwell Automation, Inc. cannot assume responsibility or liability for actual use based on the examples and
diagrams.
No patent liability is assumed by Rockwell Automation, Inc. with respect to use of information, circuits, equipment, or software described in this
manual.
Reproduction of the contents of this manual, in whole or in part, without written permission of Rockwell Automation, Inc., is prohibited.
Throughout this manual, when necessary, we use notes to make you aware of safety considerations.
WARNING: Identifies information about practices or circumstances that can cause an explosion in a hazardous environment, which may lead to
personal injury or death, property damage, or economic loss.
ATTENTION: Identifies information about practices or circumstances that can lead to personal injury or death, property damage, or economic
loss. Attentions help you identify a hazard, avoid a hazard, and recognize the consequence
Important: Identifies information that is critical for successful application and understanding of the product.
SHOCK HAZARD: Labels may be on or inside the equipment, for example, a drive or motor, to alert people that dangerous voltage may be
present.
BURN HAZARD: Labels may be on or inside the equipment, for example, a drive or motor, to alert people that surfaces may reach dangerous
temperatures.
ARC FLASH HAZARD: Labels may be on or inside the equipment, for example, a motor control center, to alert people to potential Arc Flash. Arc
Flash will cause severe injury or death. Wear proper Personal Protective Equipment (PPE). Follow ALL Regulatory requirements for safe work
practices and for Personal Protective Equipment (PPE).
Allen-Bradley, Rockwell Software, Rockwell Automation, and TechConnect are trademarks of Rockwell Automation, Inc.
Trademarks not belonging to Rockwell Automation are property of their respective companies.
Summary of changes
This manual includes new and updated information. Use these reference tables to
locate changed information.
Grammatical and editorial style changes are not included in this summary.
Global changes
This table contains a list of topics changed in this version, the reason for the
change, and a link to the topic that contains the changed information.
Chapter 2
Appendix A
Index
This manual explains how to configure security for the Logix Designer™
application. It also explains how to set up source protection for your logic and
projects. This manual is one of a set of related manuals that show common
procedures for programming and operating Logix 5000 controllers.
For a complete list of common procedures manuals, refer to the Logix 5000
Controllers Common Procedures Programming Manual , publication 1756-
PM001 .
The term Logix 5000 controller refers to any controller based on the Logix 5000
operating system.
Studio 5000 environment The Studio 5000 Automation Engineering & Design Environment® combines
engineering and design elements into a common environment. The first element is
the Studio 5000 Logix Designer® application. The Logix Designer application is
the rebranding of RSLogix 5000® software and will continue to be the product to
program Logix 5000™ controllers for discrete, process, batch, motion, safety, and
drive-based solutions.
Additional resources These documents contain additional information concerning related products
from Rockwell Automation.
Resource Description
Industrial Automation Wiring and Grounding Guidelines , Provides general guidelines for installing a Rockwell
publication 1770-4.1 Automation industrial system.
FactoryTalk Security System Configuration Guide , Provides additional information on FactoryTalk™
publication FTSEC-QS001 security.
Product Certifications website, Provides declarations of conformity, certificates, and
[Link] other certification details.
You can view the Rockwell Automation End-User License Agreement ("EULA")
by opening the [Link] file located in your product's install folder on your hard
drive.
Other Licenses
A full list of all open source software used in this product and their corresponding
licenses can be found in the OPENSOURCE folder included with the Release
Notes. The default installed location of these licenses is C:\Program Files
(x86)\Common
Files\Rockwell\Help\<Product>\ReleaseNotes\OPENSOURCE\[Link].
Trademark Notices
Other Trademarks
All other trademarks are the property of their respective holders and are hereby
acknowledged.
Warranty
This product is warranted in accordance with the product license. The product’s
performance may be affected by system configuration, the application being
performed, operator control, maintenance, and other related factors. Rockwell
Automation is not responsible for these intervening factors. The instructions in
this document do not cover all the details or variations in the equipment,
procedure, or process described, nor do they provide directions for meeting every
This document is current as of the time of release of the product; however, the
accompanying software may have changed since the release. Rockwell Automation,
Inc. reserves the right to change any information contained in this document or
the software at any time without prior notice. It is your responsibility to obtain the
most current information available from Rockwell when installing or using this
product.
Environmental Compliance
Contact Rockwell
Security overview
Introduction This chapter provides an overview of the security features available in the Logix
Designer application.
The following features are the main security features that protect controller
projects:
FactoryTalk Security FactoryTalk® Security integrates a common security model across all FactoryTalk
enabled products. FactoryTalk® Services Platform (FTSP) includes the
FactoryTalk Administration Console that provides the interface for configuring
your system. FactoryTalk Services Platform (FTSP) software is installed during
the installation of the Logix Designer application.
Use FactoryTalk Security to control access to the logic in your projects with
centrally managed, role-based policy enforcement.
For more information about FactoryTalk Security, see the FactoryTalk Security
System Configuration Guide , publication FTSEC-QS001 .
Permission sets and Logical Permission sets and Logical Names identify a set of actions that are allowed or
denied for one or more user groups or computer groups. You use permission sets
Names
and Logical Names to define user permissions in the FactoryTalk Administration
Console. Use permission sets to apply the same permissions to multiple controllers
or project components. Use a Logical Name to associate permissions with a
specific controller. When you use a Logical Name, it must match the name of the
controller.
When a user opens a project that has been secured with a permission set or a
Logical Name and configured to use only the selected security authority, the Logix
Designer application checks the ID of the FactoryTalk Directory to see if it
matches the ID stored in the project.
• If the ID matches, the Logix Designer application checks the directory and
finds the Logical Name (that matches the controller name), or the
permission set associated with the project, and gets the permissions for the
current user/computer combination.
• If the ID does not match, the project uses the Guest User permissions
defined for that permission set or Logical Name.
When a user opens a project that has been secured but has not been configured to
use only the selected security authority, the Logix Designer application checks the
connected FactoryTalk Directory, finds the Logical Name or the permission set
associated with the project, and gets the permissions for the current
user/computer combination. Rockwell recommends configuring the project to use
only the selected security authority to maintain control over the directory that
secures the project.
When you configure permission sets and logical names in the FactoryTalk
Administration Console, you can also configure permissions for Guest Users. The
permissions for Guest Users determine the level of access for users who are not
authenticated on the same FactoryTalk directory that the project was secured
with.
Permissions for Guest Users are cached in the project file to which they are
associated. However, the permissions are only stored in the project file for
permission sets that have been applied to objects by a user of the primary
FactoryTalk directory.
Refer to the FactoryTalk online help for more information on permissions for
Guest Users.
Source Protection Source Protection limits users' ability to view and edit routines and Add-On
Instructions, including equipment phase state routines, without the associated
source key or license. Apply Source Key Protection or License Source Protection
to routines and Add-On Instructions. Apply Execution Protection to license-
protected components to allow execution only on controllers with a specific
execution license.
Tip: Routines and Add-On Instructions are currently the only project component types that support Source
Protection.
Tip: Execution Protection and component locking is supported only on Compact GuardLogix 5380, CompactLogix
5380, CompactLogix 5480, ControlLogix 5580, and GuardLogix 5580 controllers in versions 30 and 31 of the
Logix Designer application.
License Source Protection and Execution Protection Licenses require the use of
CmSticks and CmCards:
Introduction This chapter describes how to enable and apply source protection for your Logix
Designer components, such as routines and Add-On Instructions. You can
protect project components using Source Key protection or License protection.
You can also apply Execution Protection to source-protected components to allow
execution only on controllers with a specific execution license.
License protection:
Tip: Execution Protection and component locking is supported only on Compact GuardLogix 5380, CompactLogix
5380, CompactLogix 5480, ControlLogix 5580, and GuardLogix 5580 controllers in version 30 of the Logix
Designer application.
Considerations and limitations Keep the following considerations and limitations in mind when using License
Source Protection with routines and Add-On Instructions for CompactLogix
for License protection and
5380, CompactLogix 5480, ControlLogix 5580, Compact GuardLogix 5380, and
locked components GuardLogix 5580 controllers.
Cannot change a BOOL alias that targets the bit of an integer to target a different x
bit. However, changing the alias to target a different integer is allowed.
Cannot change the target of an alias that is referenced by a locked routine to a tag x
of a different type.
Cannot change the target of an alias of a member of a UDT or array element to a x
target at a different offset from the beginning of the tag.
Cannot change an alias referenced by a locked routine to a base tag. x
Cannot change a base tag that is referenced by a locked routine to an alias. x
Cannot change an InOut program parameter that is referenced by a locked routine x
to anything other than an InOut program parameter.
Enable source protection If Source Protection is unavailable and is not listed in the Tools > Security menu,
enable the Source Protection feature by running the [Link] tool on the
installation CD. The menu item is also enabled when a CmStick containing a
license with protect permissions is inserted into any USB port on the computer.
Disable the Configure You can disable the ability to configure source protection on a workstation by
removing the Configure Source Protection option from the Tools > Security
Source Protection menu menu.
option
Important: Write down the source keys or make a copy of the [Link] file and store in a secure location before
deleting the [Link] file.
5. In the dialog box that prompts you to confirm the action, click Yes.
6. In the dialog box that asks if you want to delete the source key file ([Link]),
click Yes to remove the source key file from the computer, or select No to
keep the source key file.
Tip: The menu item will not disappear if a CmStick containing a license with the
Protect permission is connected to the computer.
Protect components with When Source Key protection is applied to a component, that component is
source-protected. Source keys are user-generated, case-sensitive passwords that
Source Keys lock Logix Designer components from being viewed or modified by third parties.
Important: Source Protection can be applied only on a project file that is offline.
Tip: For Add-on Instructions, Source Protection settings cannot be modified if the Add-On Instruction is sealed. If
you wish to source protect and seal an Add-On Instruction, you must apply the source protection settings
before sealing.
Tip: Password source protection is designed to work with a relatively small number of source keys in the [Link] file.
When the number of source keys becomes large, there is a corresponding performance impact when opening
source protected projects in the Logix Designer application or opening the Source Protection dialog box.
When a component is protected with a Source Key, users without the source key
cannot alter the logic of the component. This affects the following features:
• Editing - The Language editor does not open, and the edit menus in the
Controller and Logical Organizers are unavailable. The component icon
is also unavailable. If the component is protected with the Viewable option,
users can open the routine editor in read-only mode.
• Printing - Routines cannot be printed. Add-On instruction can be printed,
but the routines and local tags are not included in the print out. Routine
logic and Add-On Instruction local tags can be printed if components are
protected with the Viewable option.
• Exporting - The protected component is written to the export file in an
encoded format.
Because users cannot view the logic of a protected routine, the Find All search
results items do not navigate to the found locations. This affects the following:
About source keys In version 18 and earlier of RSLogix 5000 software, only IEC-61131 compliant
source keys are recognized. Each source key must begin with a lowercase character
a-z or underscore character ( _ ), and contain only characters lowercase a-z, 0-9,
and an underscore character ( _ ). You can enter uppercase A-Z characters in
RSLogix 5000 software or in the source key file, but the uppercase characters are
converted to lowercase. Source keys are limited to 40 characters in length.
In version 19 and later of the application, source keys are case-sensitive and may
contain any printable ASCII character, excluding the space character. This
includes uppercase A-Z, lowercase a-z, numbers 0-9, and symbols such as "!@#$%.
Source keys are limited to 40 characters in length.
Source key names Version 19 and later of the Logix Designer application supports associating names
with source keys. Source key names are descriptive text that help identify source
keys. Where appropriate, the Logix Designer application will display the source
key name in place of the source key itself to provide an additional layer of security
for the source key.
Use descriptive names to help identify the purpose of the source. For instance, a
source key used to secure components that field engineers require access might be
named, Field Engineer.
Important: If the same source keys will be used with version 18 and earlier and version 19 and later of the
Logix Designer application, begin each source key with a lowercase character a-z, or an underscore
character ( _ ), and use only characters lowercase a-z, 0-9 , or an underscore character ( _ ) within
the source keys.
If you use source key names in version 19 and later of the application, and your source keys are
IEC61131-3 compliant, your source keys will still work in version 18 and earlier.
Source key file Source keys that are available to the application through an [Link] file are
unencrypted. We recommend that you write down your source keys or back up
and store the [Link] file in a secure location. If necessary, the individual keys can be
distributed or provided to the necessary parties.
Important: Source key files are created in an ANSI format in Logix Designer versions 18 and earlier. In versions 19
and later, the Logix Designer application creates UTF-8 formatted [Link] files, and modified ANSI
[Link] files are converted to UTF-8 [Link] files.
Source keys must not appear on the first line of a UTF-8 formatted [Link] file. The first line of UTF-8
formatted [Link] files is ignored in Logix Designer versions 18 and earlier. Versions 19 and later insert
a header on the first line of the [Link] file if one is not already present.
3. In the Source Key Configuration dialog box, click View to open the [Link]
file with a text editor, such as Notepad.
4. Click at the end of an existing, unnamed source key, and press Enter.
Source keys are case sensitive and may use special characters, such as
@#$%(){}[].
Tip: Source keys always begin in the first column of the line in the text editor. A source
key name must be on the line immediately following the source key that it is
associated with, preceded on the line by at least one space. Subsequent lines after
the source key that are preceded with spaces are ignored by the application, and
can be used for comments.
6. Save the file. If you used an editor other than Notepad, make sure you save
the file as a text file.
7. Close the Source Key Configuration dialog box and the Source
Protection Configuration dialog box.
8. Click Tools > Security > Configure Source Protection to re-open the
Source Protection Configuration dialog box. The source key name that
you added to the [Link] file appears as the source key name.
Apply Source Key protection to Follow this procedure to apply Source Key protection to a project component.
a component
Important: Source Protection can be applied only on a project file that is offline.
Tip: For Add-on Instructions, Source Protection settings cannot be modified if the Add-On Instruction is sealed. If
you wish to source protect and seal an Add-On Instruction, you must apply the source protection settings
before sealing.
2. On the menu bar, click Tools > Security > Configure Source Protection.
By default, the dialog box shows the Protection view in which components
are organized based on the protection applied to them. When you select the
Container view, the components are organized based on the folder
structure in the Controller Organizer and the Logical Organizer.
4. In the Protect dialog box, on the Protection Type list, click Source Key.
6. If appropriate, retype the new key in Confirm New Source Key. To display
the source keys in a readable format, select the Show Source Key check box.
7. If you want to apply a source key name, type the name in Source Key
Name. Do not exceed 40 characters.
8. To allow users to view the logic and local tags on a system that does not have
the source key required for access, select the Allow viewing of
component(s) check box.
• Click Specify to change the path to the source key file location.
• Click View to view the source key file.
• Click Clear to remove the location of the source key file ([Link]). You
are then given the option to delete the source key file.
• Click Disable Configuration to remove the menu item that invokes
the Source Protection Configuration dialog box. You can then clear
the file location, which is the path listed under Source Key Provider,
or delete the source key file.
11. Close the Source Protection Configuration dialog box and save the
project file.
Specify a Source Key file and location Follow these steps to configure a source key file location.
2. On the menu bar, click Tools > Security > Configure Source Protection.
Tip: This option is not available until you run [Link] on your workstation. See Enabling source
protection on page 18.
3. In the Logix Designer dialog box, click Yes to specify a file location. Source
protection requires that you specify a source key file location on your
workstation.
4. In the Specify Source Key File Location dialog box, click Browse .
5. In the Browse for Folder dialog box, click the folder to store the key file,
and click OK.
You can save the key file in any accessible folder. In this example the path to
the key file folder is C:\RSLogix 5000\Projects folder.
6. In the Specify Source Key File Location dialog box, click OK.
Tip: To check for a specific location, on the Source Protection Configuration dialog box, click Specify. A
window appears with the location if one exists on your workstation.
View components without a key Follow these steps to allow source-protected components to be viewed in a read-
only format on a system that does not have the source keys.
1. On the menu bar, click Tools > Security > Configure Source Protection.
4. Select the Allow viewing of components check box, and click OK. In the
Source Protection Configuration dialog box, +View appears for
components that are viewable on workstations that do not have the source
key.
5. Click Close.
Users can open the routine as read-only on a system that does not contain
the source key for the routine, but cannot modify the routine. Routines or
Add-On Instructions that are protected, but are not configured as viewable,
cannot be opened.
Tip: Source-protected content cannot be copied from Logix Designer versions 19 and later and pasted into earlier
software versions. The pasting function is disabled in previous software versions when source-protected
content is placed on the clipboard.
Follow these steps to verify source key protection by specifying the path to an
empty [Link] file.
2. On the Specify Source Key File Location dialog box, select a directory that
does not contain an [Link] file. For example, C:\RSLogix
5000\Projects\Empty.
3. When a message appears asking if you want to create a new file, click Yes.
4. When the message appears asking if you want to create a new directory,
click Yes. The software points to an empty [Link] file, which mimics a user
who does not have a source key.
6. On the Specify Source Key File Location dialog box, switch back to the
directory that contains your original [Link] file.
Remove access to a protected routine You can delete a source key file ([Link]) from a workstation.
Important: Write down the source keys or make a copy of the [Link] file and store it in a secure location
before deleting the [Link] file.
2. Click Tools > Security > Configure Source Protection to open the
Source Protection Configuration dialog box.
5. When a dialog box asks for confirmation that you want to delete the source
key file, select Yes to remove the source key file from the workstation.
License Source Protection License Source Protection limits access to projects to only users with the required
license. Users without the required license cannot open the project or import
for components components protected by the license. A CmStick containing the corresponding
license must be plugged into a USB port on the computer to open the project
containing the component.
License protection uses licenses that you create and administer through a license
portal. Refer to your license portal help for details on using the portal.
Tip: License Source Protection is not supported on the following routine types on Compact GuardLogix
5380, CompactLogix 5380, CompactLogix 5480, ControlLogix 5580, and GuardLogix 5580 controllers:
• Sequential Function Chart routines.
• Function Block Diagrams, unless the Function Block Diagram is included in an Add-On Instruction.
Permission Description
Use The minimum permission available for a license. Allows a user to open, import,
upload, or download the project.
Important: On CompactLogix 5370, ControlLogix 5570, Compact GuardLogix
5370, and GuardLogix 5570 controllers, insert a CmStick containing a license
with Use permission in any USB port on the computer. A network license server
cannot provide Use permission. Either the local CmStick or a license server on the
network can contain all other license privileges.
Tip: On Compact GuardLogix 5380, CompactLogix 5380, CompactLogix 5480,
ControlLogix 5580, and GuardLogix 5580 controllers, a Use license is not required
to open, import, upload, or download a project containing a License-Protected
component when that component is locked.
View View routine logic for the component or local tags for an Add-On Instruction.
Enables printing, searching, and cross referencing. Limits the components editors
and properties dialog boxes to read-only, and prevents changes.
Tip: To unlock, view, and re-lock a License-Protected component requires a View
license.
Edit Edit the routine or Add-On Instruction.
Tip: To unlock, view, and re-lock a License-Protected component requires a View
license.
Copy Copy the logic in the routine or Add-On Instruction.
Export Export the routine or Add-On Instruction in a non-encrypted format.
• Editing - If the license does not contain the View permission, the Language
editor does not open, the edit menus are unavailable in the Controller
Organizer and the Logical Organizer, and the component icon is dimmed.
With View permission, the editor opens in read-only mode. Allows editing
if the license contains Edit permission.
• Printing -The license must contain View permission to print routines. Can
print Add-On instructions, but the routines and local tags do not print
without View permission.
• Exporting - Writes the protected component to the export file in an
encoded format unless the license contains Export permission. To export in
non-encrypted text, the license must contain the Export permission, and
when saving the export file, deselect the Encode Source Protected
Content option. Locked components are always exported encoded.
Tip: To export protected components in non-encrypted text, uncheck the Always Encode Protected Content on
Export check box on the General tab of the Workstation Options dialog box.
• Search and Replace - Find All is the only available search type. Find Next,
Replace All, and Replace Next skip the protected component. When
skipping the protected component, a message appears on the status bar
indicating the source is not available. This message is logged to the search
results tab for a Replace All search. Edit and View permissions control
users' ability to search and replace.
When the license does not contain the View permission, users cannot view the
logic of a protected routine, and the Find All search result items do not navigate
to the found locations. This affects the following features:
Add Execution Protection to Execution Protection is an extension of License-Based Source Protection. You can
License-protected components apply Execution Protection to limit the execution of routines and Add-On
Instructions, including equipment phase state routines, to controllers that contain
a specific execution license.
When you apply Execution Protection to a component, you first apply License-
Based Source Protection. Therefore, a user applying Execution Protection must
have the same credentials that are required to apply License-Based Source
Protection:
Apply License Protection to one Follow these steps to apply License Protection to one or more components.
or more components
Tip: Version 32 of the Logix Designer application, License Source Protection does not support these routine types:
• Safety routines.
• Sequential Function Chart routines.
• Function Block Diagrams on Compact GuardLogix 5380, CompactLogix 5380, CompactLogix 5480,
ControlLogix 5580, and GuardLogix 5580 controllers, unless the Function Block Diagram is included in an
Add-On Instruction. However, License-protected Function Block Diagrams are supported are supported in
both routines and Add-On Instructions on CompactLogix 5370, ControlLogix 5570, Compact GuardLogix
5370, and GuardLogix 5570 controllers.
Tip: Cannot modify the Source Protection settings if the Add-On Instruction is sealed. To source protect and seal an
Add-On Instruction, apply the source protection settings before sealing.
Important: On CompactLogix 5380, CompactLogix 5480, ControlLogix 5580, Compact GuardLogix 5380, and
GuardLogix 5580 controllers, to open a project when a component is license-protected but not
locked, insert a CmStick containing the corresponding license into a USB port on the computer. A
locked component does not require a corresponding license to open the project or use the
component.
1. Click Tools > Security > Configure Source Protection to open the
Source Protection Configuration dialog box.
2. Insert the CmStick containing the license that you want to use to protect
the component into the USB port on the computer. Note that licenses must
contain the Protect permission to be used to protect components. If a
license does not contain the Protect permission, it will not appear in the list
of licenses.
the one specified for the project and that contains a CmCard with the
execution license that you select.
If you select Protect with controller key and specific license, select
the execution license from the list of available licenses.
On CompactLogix 5380, CompactLogix 5480, ControlLogix 5580,
Compact GuardLogix 5380, and GuardLogix 5580 controllers, after
components are protected, they can also be locked. Locking a
component prevents users from viewing or editing the component but
allows authorized users to run it.
Tip: To save changes to a component that is protected with License-Based Source Protection, a CmStick containing
the required license must be plugged into the computer running the Logix Designer application.
Make sure you save your edits to the project or lock the protected components before removing the CmStick
containing the required license. If the license is not present, you could lose your edits to the project.
7. Close the Source Protection Configuration dialog box and save the
project file.
Lock a component After you apply License Source Protection to a routine or an Add-On Instruction,
you can lock it on Compact GuardLogix 5380, CompactLogix 5380,
CompactLogix 5480, ControlLogix 5580, and GuardLogix 5580 controllers.
When locking a component, the routine's logic is compiled into executable code
and encrypted. The code is decrypted by the controller when it is ready for
execution. As a result, sharing project files containing locked components with
users without licenses to use the locked components is possible. Those users can
use unprotected parts of the project, upload and download the project file, and
copy and paste locked components into other project files. However, if a
component is protected using the Protect with controller key and specific
license option, executing the project requires an SD card with the correct
execution license.
Tip: To lock or unlock a component, the source license must be present on a CmStick plugged into the computer
running the Logix Designer application, and the license must contain the View permission.
Important: When locking a routine or an Add-On Instruction, the data included in tags is protected, but not to
the extent that the logic is protected. If your tags contain sensitive data, Rockwell recommends
putting that data in character string literals rather than in tags. Literals are protected at the same
level as the logic in locked routines and Add-On Instructions.
3. Click Lock.
Tip: When a component is License-Protected, lock and unlock it by selecting it in the Controller Organizer, right-
clicking, and selecting Lock or Unlock. Use the Security toolbar to lock and unlock a component or to lock all
License-Protected components at once.
Lock all License-Protected Lock a routine or Add-On Instruction that is protected by License Source
Protection and is shared outside a trust boundary, such as sent using email or to an
content
end customer. Do not distribute projects that contain unlocked components
because they are in a less secure state.
To lock all license-protected components in a project at once, use the Lock All
button on the Security toolbar.
2. On the Security toolbar, click the Lock All button. This button is
disabled when there are no components to lock.
Or on the main menu, select Tools > Security > Lock all unlocked
content.
Tip: If an error prevents a component from locking, an error message appears. The Logix Designer
application locks other eligible components without error.
Add an LV instruction to To monitor license status and verify the license is not expired or removed, insert a
monitor license status License Validation (LV) instruction in a Ladder diagram. The LV instruction
checks that a non-expired license associated with a routine or an Add-On
Instruction is present in the controller. Insert additional logic in the routine to act
on the license status.
Share License privileges with Adjust network settings to provide additional privileges to users on the network
or to use License Source Protection when using a remote desktop connection.
other users on your network
When sharing license privileges with users on the network consider:
• Enable the license to share for network use. Use the License Portal to
configure licenses and optionally enable them for network use.
• The computers that receive permissions from the remote workstation must
install a CmStick that contains the same license with Use permission. Plug
the CmStick into a USB port locally on the computers.
You can share license privileges with other users and provide license privileges to
users of remote desktop.
Provide License privileges to other Follow these steps to provide license privileges to users on your network.
users
1. To open the CodeMeter Control Center™ application, on the computer
that is going to provide additional privileges, navigate to the C:\Program
Files (x86)\CodeMeter\Runtime\bin folder and run the [Link]
file.
Important: Your computer should have a CmStick installed that contains a license with all the privileges that
you want to share. The CmStick should be plugged into a USB port on your computer.
3. Click Configuration > Server, select Run network server, and click Apply.
7. Click Add and enter the list of users (user names, IP addresses, user groups,
or subnets) who can access your shared license. Click Apply.
9. On the computers that need to receive the shared license privileges, open
the CodeMeter Control Center application.
11. On the Configuration tab, in the server list, add the name or IP address of
the computer that you configured as a license server.
Tip: When the Server Search List is blank in the CodeMeter WebAdmin tool, CodeMeter searches all servers
that it finds on your subnet. When a user has a license that is also on a license server, the user's permissions
might be upgraded to match the license on the server. To prevent accidental granting of privileges and to
prevent CodeMeter from searching unnecessarily, add [Link] (the localhost IP address) to the Server
Search List.
Important: Your computer should have a CmStick installed that contains a license with all
the privileges that you want to use remotely. The CmStick should be plugged
into a USB port on your computer.
3. Click Configuration > Server, select Run network server, and click Apply.
7. Click Add and enter the list of users (user names, IP addresses, user groups,
or subnets) who can access your shared license. Click Apply.
Important: A CmStick containing a corresponding license with Use permission must be present locally on any
USB port on the remote desktop server. Use permission cannot be obtained from a remote
computer.
11. On the Configuration tab, in the server list, add the name or IP address of
the computer that contains the needed permissions.
12. Navigate to the Process tab on the CodeMeter Control Center to stop
and then restart CodeMeter.
Tip: When the Server Search List is blank in the CodeMeter WebAdmin tool, CodeMeter searches all servers
that it finds on your subnet. When a user has a license that is also on a license server, the user's permissions
might be upgraded to match the license on the server. To prevent accidental granting of privileges and to
prevent CodeMeter from searching unnecessarily, add [Link] (the localhost IP address) to the Server
Search List.
You can secure a controller with the Logix CPU Security Tool. The Logix CPU
Security Tool is automatically installed when you install Logix Designer version
17, 18, or 19. The tool is installed under the Logix Designer menu bar on the
Tools menu.
Important: The Logix CPU Security Tool is supported only in Logix Designer application versions 17, 18, and 19. It is
not supported in versions 20 and later.
1. Click the Start button, then click All Programs, then click Rockwell
Software, then click RSLogix 5000, and then click Logix CPU Security
Tool.
2. In the Logix CPU Security dialog box, click the RSWho button to specify
a path to the controller.
3. Select the controller that you want to secure and click OK.
The Logix CPU Security Tool displays the current status of the controller.
Notice that the controller in the following image is currently unsecured and
there is no password set in the controller.
5. In the Change Password dialog box, in the New Password box type a
password, and then in the Confirm New Password box, retype the
password. Click OK.
7. In the Secure Controller dialog box, in the Password box, type the
password for the controller and then click Secure.
8. If the controller has nonvolatile memory installed, you can select the Save
to Nonvolatile Memory after controller is secured check box to save the
security state of the controller to nonvolatile memory. Refer to the Logix
The Controller Security Status for the controller changes to indicate that
it is secured.
Accessing a secured When you try to access a controller that has been secured with the Logix 5000
controller CPU Security Tool and you do not have a local copy of the project file on your
computer, the application prompts you to select the proper file.
1. On the menu bar, click Communications, and then click Who Active.
2. In the Who Active dialog box, click the secured controller and click Go
Online.
If you do not have a local copy of the project file on your computer, the
application prompts you to select a file.
4. In the Enter New or Select Existing File dialog box, click the project file
and then click Select.
6. Click OK to continue.
If the project file already exists on your system, an error message appears
that indicates that the controller is secured and you cannot go online.
1. Start the Logix CPU Security Tool. Click the Start button, then click All
Programs, then click Rockwell Software, and then click Logix CPU
Security Tool.
2. In the Logix CPU Security dialog box, click the RSWho button to specify
a path to the controller.
5. In the Unsecure Controller dialog box, in the Password box, type the
password for the controller and then click Unsecure.
The controller is now unsecured, but the controller still recognizes the
password.
6. Select Exit.
Click Yes to save the change. You can now go online with the controller.
2. In the Change Password dialog box, remove the '****' empty string and
click OK.
When used with the Logix Designer application, FactoryTalk Security supports
Product Policies and Securable Actions. You configure these FactoryTalk Security
settings in the FactoryTalk Administration Console.
Product Policies are not tied to a specific project, and may include the following.
Securable Actions let you perform specific tasks on a specific project or group of
projects, and may include the following.
• Viewing a project
• Going online
• Creating tags
• Creating modules
Keep the following considerations in mind when configuring security settings for
the Logix Designer application.
FactoryTalk Services Platform version 2.50 (SR5) or later supports associating the
project with a specific FactoryTalk Directory.
securable actions The Product Policies and Securable Actions listed here are configured in the
Network Directory using the FactoryTalk Administration Console. For details see
the FactoryTalk Security System Configuration Guide. That document is available
in the Rockwell Automation Literature Library. Click the following link to open
the Literature Library in a browser window:
Enable or disable a tag-based alarm using the Use and evaluate alarm check box on the
Alarm: Use and Evaluate
Alarm Properties dialog box - Advanced tab.
Alarm: Clear Alarm Log Clear the contents of the alarm log from the controller.
Respond to a tag-based alarm using the Acknowledge, Shelve, Disable, and Reset buttons
Alarm: Direct Commands
on the Alarm Properties dialog box - Status tab.
Create new alarm definitions.
Alarm Definition: Create An alarm definition is associated with an Add-On Instruction (AOI) or a defined data type.
When a tag is created using a data type or an AOI that has alarm definitions, alarms are
created automatically based on the alarm definitions.
Component: Modify Permission Set Change which permission set is associated with a component.
Controller: Clear Faults Edit the fault log, including clearing faults.
Controller: Lock/Unlock Lock or unlock the controller for online edits.
Controller: Modify Mode Change controller modes.
Controller: Modify Properties Edit controller properties.
Controller: Modify Revision Convert the .acd file to a higher revision.
Controller: Modify Type Change controller types.
If a user is granted Controller: Modify Revision privilege, but is denied Controller: Modify
Type, in most situations the user will be unable to change the type of controller. However,
during database conversion, it may be necessary to change the controller type because the old
controller type is obsolete in the target revision. In this case, these users are allowed to
change the controller type during conversion.
Data Log: Clear Log Data Value Clear a data log value.
Use the Logix Designer application to update controller firmware.
The Product Policy (Firmware:Update) is also required to perform firmware updates. Firmware
Firmware: Update
updates can be initiated within the Logix Designer application WhoActive dialog box if a
project is open, but not when the controller is online.
Associate project documentation with a language, set default language, add or delete a
Language: Modify Properties
language.
Language: Switch Language Select a different language for product documentation.
Module: Create Create modules in the Controller Organizer.
Module: Create and Safety: Modify Component Create safety I/O configuration.
Module: Delete Delete modules in the Controller Organizer.
Module: Delete and Safety: Modify Component Delete safety I/O configuration.
Module: Maintenance High Perform high impact operations such as module reset and calibration.
Module: Maintenance Low Perform low impact operations such as resetting electronic fuses.
Module: Modify Properties Edit module properties.
Module: Modify Properties and Safety: Modify Modify safety I/O configuration.
Component
View module properties.
Users with this permission can open device profiles and, when online with the controller, use
Module: View Properties the profile to directly interact with modules and carry out actions such as changing IP
addresses.
When this permission is denied, users cannot open device profiles.
Motion: Command Axis Perform axis direct commands.
Motion: Modify Configuration Modify axis, coordinate system, or motion group properties.
Nonvolatile Memory: Load Load from non-volatile memory.
Nonvolatile Memory: Store Store to non-volatile memory.
Phase: Create Create equipment phases.
Phase: Delete Delete equipment phases.
Phase: Manual Control Manually control equipment phases.
Phase: Modify Properties Edit equipment phases.
PLC/SLC: Modify Tag Mappings Map PLC or SLC messages.
Plug-In: Display Display plug-ins.
Print: Report Print reports.
Program: Create Create programs.
Program: Create and Safety: Modify Create a safety program.
Component
Program: Delete Delete programs.
Program: Delete and Safety: Modify Delete a safety program.
Component
Program: Modify Properties Edit program properties.
Program: Modify Properties and Safety: Modify properties of a safety program.
Modify Component1
Program: Modify Properties and Safety: Change class property of a standard program to safety.
Modify Component
Project: Compact Compact a project file.
1
A safety program’s max scan time can be reset, regardless of the protection.
2
The safety task max scan time and max/min interval scan timers can be reset,
regardless of the protection.
I
install
source protection 18
L
License-based source protection 32
lock a License-protected component 35
LV instruction 36
P
password
removal 52
project
protect 15
Rockwell Automation Publication 1756-PM016N-EN-P - November 2018 59
Rockwell Automation support
Rockwell Automation provides technical information on the web to assist you in using its products. At
[Link] you can find technical and application notes, sample code, and links to software service packs. You
can also visit our Support Center at [Link] for software updates, support chats and forums, technical
information, FAQs, and to sign up for product notification updates.
In addition, we offer multiple support programs for installation, configuration, and troubleshooting. For more information, contact your local
distributor or Rockwell Automation representative, or visit [Link] .
Installation assistance
If you experience a problem within the first 24 hours of installation, review the information that is contained in this manual. You can contact
Customer Support for initial help in getting your product up and running.
United States Contact your distributor. You must provide a Customer Support case number (call the phone number above to obtain one) to
your distributor to complete the return process.
Outside United States Please contact your local Rockwell Automation representative for the return procedure.
Documentation feedback
Your comments will help us serve your documentation needs better. If you have any suggestions on how to improve this document, complete the
feedback form, publication RA-DU002 [Link]
Supersedes Publication 1756-PM016M-EN-P - February 2018 Copyright © 2018 Rockwell Automation Technologies, Inc. All Rights Reserved. Printed in the U.S.A.