Opcwccuenus en Us
Opcwccuenus en Us
System Manual
Online documentation
05/2021
Online documentation
Legal information
Warning notice system
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent damage
to property. The notices referring to your personal safety are highlighted in the manual by a safety alert symbol, notices
referring only to property damage have no safety alert symbol. These notices shown below are graded according to
the degree of danger.
DANGER
indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will be
used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to property
damage.
Qualified Personnel
The product/system described in this documentation may be operated only by personnel qualified for the specific
task in accordance with the relevant documentation, in particular its warning notices and safety instructions.
Qualified personnel are those who, based on their training and experience, are capable of identifying risks and
avoiding potential hazards when working with these products/systems.
Proper use of Siemens products
Note the following:
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
documentation. If products and components from other manufacturers are used, these must be recommended or
approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and maintenance
are required to ensure that the products operate safely and without any problems. The permissible ambient
conditions must be complied with. The information in the relevant documentation must be observed.
Trademarks
All names identified by ® are registered trademarks of Siemens AG. The remaining trademarks in this publication may
be trademarks whose use by third parties for their own purposes could violate the rights of the owner.
Disclaimer of Liability
We have reviewed the contents of this publication to ensure consistency with the hardware and software described.
Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the information in this
publication is reviewed regularly and any necessary corrections are included in subsequent editions.
1 Introduction ........................................................................................................................................... 5
1.1 Principle .............................................................................................................................. 5
1.2 OPC specifications and compatibility..................................................................................... 5
2 Using OPC UA certificates ...................................................................................................................... 7
2.1 Introduction to OPC UA certificates ....................................................................................... 7
2.2 Providing certificates on a Unified PC .................................................................................... 9
2.2.1 Using a Unified PC as OPC UA server ..................................................................................... 9
2.2.1.1 Using root certificates (Unified PC as OPC UA server) ............................................................. 9
2.2.1.2 Using self-signed certificates (Unified PC as OPC UA server)................................................. 11
2.2.2 Using a Unified PC as OPC UA client .................................................................................... 12
2.2.2.1 Using root certificates (Unified PC as OPC UA client) ............................................................ 12
2.3 Providing certificates on a Unified Comfort Panel ................................................................ 14
2.3.1 Use the Unified Comfort Panel as an OPC UA server ............................................................ 14
2.3.1.1 Using root certificates (UCP as OPC UA server) .................................................................... 14
2.3.1.2 Using self-signed certificates (UCP as OPC UA server) .......................................................... 16
2.3.2 Use the Unified Comfort Panel as an OPC UA client ............................................................. 17
2.3.2.1 Using root certificates (UCP as OPC UA client) ..................................................................... 17
2.3.2.2 Using self-signed certificates (UCP as OPC UA client) ........................................................... 19
2.4 Providing certificates for the engineering systems as OPC UA client ..................................... 20
3 WinCC Unified OPC UA server .............................................................................................................. 21
3.1 General information about Unified OPC UA servers ............................................................. 21
3.1.1 Using the WinCC Unified OPC UA server.............................................................................. 21
3.1.2 Requirements for use ......................................................................................................... 22
3.1.3 Operating principle of the OPC UA server ........................................................................... 24
3.1.4 Security concept of OPC UA................................................................................................ 25
3.1.5 Configuring the security mechanisms ................................................................................. 30
3.1.6 Supported OPC UA services and profiles.............................................................................. 33
3.1.7 Address space of the OPC UA server ................................................................................... 35
3.1.8 OPC UA Data Access ........................................................................................................... 40
3.1.9 Alarm conditions................................................................................................................ 40
3.1.10 Managing OPC UA server certificates .................................................................................. 41
3.2 Using the Unified PC as OPC UA server ................................................................................ 41
3.2.1 Exporting tags ................................................................................................................... 41
3.2.2 Configuring a Unified OPC UA server (Unified PC) ................................................................ 43
3.2.2.1 Configuration file ............................................................................................................... 43
3.2.2.2 Configuration of the OPC UA server .................................................................................... 44
3.2.3 Trace ................................................................................................................................. 46
3.3 Using the Unified Comfort Panel as OPC UA server .............................................................. 47
3.3.1 Configuring a Unified OPC UA server (UCP) with SIMATIC Extensions ................................... 47
3.3.1.1 Changing the security settings of the Unified OPC UA server ............................................... 47
Overview
OPC UA specifies interfaces to gain access to the following objects in WinCC Unified:
• Process values (OPC UA 1.03)
• Tag-based alarms (OPC UA 1.03)
For detailed information about the individual OPC specifications, refer to the website of the OPC
Foundation (http://www.opcfoundation.org).
Compatibility
Interoperability with OPC products from other manufacturers is guaranteed by participation in
"OPC Interoperability Workshops".
Introduction
Communication between an OPC UA server and its OPC UA clients that is protected by
certificates requires the following:
• A valid OPC UA server certificate is installed on the server and a valid OPC UA client certificate
is installed on the clients.
• The client devices trust the OPC UA server certificate and vice versa.
The type of the certificate used determines how the trust is established between OPC UA server
and OPC UA clients:
• When a communication partner uses a certificate issued by a certificate authority (CA) and
the other communication partners trust the root certificate of the certificate authority, they
automatically trust the OPC UA certificate.
Note
Support of external certificate authorities
The OPC UA certificate of a Unified device cannot be issued by an external certificate
authority. The WinCC Unified Certificate Manager tool is required to create the root
certificate and the OPC UA certificate.
How you proceed to create the trust relationship on a Unified device also depends on whether
you are using the Unified device as an OPC UA server or client.
If you are using a Unified device as a client, the engineering system also acts as an OPC UA client
during configuration of the device.
Used as Section
Unified PC OPC UA server Using root certificates (Unified PC as OPC UA server) (Page 9)
Using self-signed certificates (Unified PC as OPC UA server) (Page 11)
OPC UA client Using root certificates (Unified PC as OPC UA client) (Page 12)
Unified Comfort Panel OPC UA server Using root certificates (UCP as OPC UA server) (Page 14)
Using self-signed certificates (UCP as OPC UA server) (Page 16)
OPC UA client Using root certificates (UCP as OPC UA client) (Page 17)
Using self-signed certificates (UCP as OPC UA client) (Page 19)
Engineering System OPC UA client Providing certificates for the engineering systems as OPC UA client
(Page 20)
Unified tools
When you use certificates issued by a certificate authority, the following tools support you in
providing the certificates:
Installing the Unified PC that is used as OPC UA WinCC Unified Certificate Manager
• Unified root certificate (if not yet done) device
• Unified OPC UA certificate Unified Comfort Panel that is Control Panel > Security > Certificates
used as OPC UA device
Distribute Unified root certificate and its CRL Unified PC that is used as certifi‐ WinCC Unified Certificate Manager
file to the OPC UA communication partners cate authority for the Unified
OPC UA device1
Import the root certificate of the OPC UA Unified PC that is used as OPC UA SIMATIC Runtime Manager
communication partner and its CRL file device
Unified Comfort Panel that is Control Panel > Security > Certificates
used as OPC UA device
1
If the OPC UA device is a Unified PC, you can alternatively distribute the root certificate and CRL file directly on the device using
SIMATIC Runtime Manager.
When you use self-signed OPC UA certificates, the following tools support you in providing the
certificates:
Note
Operation of the Certificate Manager and Runtime Manager
For more detailed information on operating the Certificate Manager and the Runtime Manager,
refer to the Runtime online help.
Note
Operating Certificate Manager and Runtime Manager
For more detailed information on operating the Certificate Manager and the Runtime Manager,
refer to the Runtime online help.
Requirement
• A root certificate was generated on the Unified PC that serves as certificate authority.
Sequence
The following steps are included in providing the certificates:
1. Generate the OPC UA server certificate and export its certificate configuration.
2. Install the certificate configuration on the Unified OPC UA server.
3. Trust the OPC UA client on the Unified OPC UA server.
4. Trust the Unified OPC UA server on the OPC UA client.
Note
Operating the Runtime Manager
For more detailed information on operating the Runtime Manager, refer to the Runtime online
help.
Sequence
1. Trust the OPC UA client on the Unified PC.
2. Trust the self-signed default certificate of the Unified OPC UA server on the OPC UA client.
Note
Operating Certificate Manager and Runtime Manager
For more detailed information on operating the Certificate Manager and the Runtime Manager,
refer to the Runtime online help.
Requirement
• A root certificate was generated on the Unified PC that serves as certificate authority.
Sequence
The following steps are included in providing the certificates:
1. Generate the OPC UA client certificate and export its certificate configuration.
2. Install the certificate configuration on the OPC UA client.
3. Trust the OPC UA server on the Unified OPC UA client.
4. Trust the Unified OPC UA client on the OPC UA server.
Note
Operating the Certificate Manager
For more detailed information on operating the Certificate Manager, refer to the Runtime online
help.
Requirement
• A root certificate was generated on the Unified PC that serves as certificate authority.
Sequence
The following steps are included in providing the certificates:
1. Generate the OPC UA server certificate and export its certificate configuration.
2. Install the certificate configuration on the Unified OPC UA server.
3. Trust the OPC UA client on the Unified OPC UA server.
4. Trust the Unified OPC UA server on the OPC UA client.
Sequence
1. Trust the OPC UA client on the Unified Comfort Panel.
2. Trust the self-signed default certificate of the Unified OPC UA server on the OPC UA client.
Note
Operating the Certificate Manager
For more detailed information on operating the Certificate Manager, refer to the Runtime online
help.
Requirement
• A root certificate was generated on the Unified PC that serves as certificate authority.
Sequence
The following steps are included in providing the certificates:
1. Generate the OPC UA client certificate and export its certificate configuration.
2. Install the certificate configuration on the Unified OPC UA client.
3. Trust the OPC UA server on the Unified OPC UA client.
4. Trust the Unified OPC UA client on the OPC UA server.
The root certificate and its CRL are imported and classified as trusted.
The Unified OPC UA client trusts the OPC UA server certificate when the next connection attempt
is made.
Sequence
1. Generate your own self-signed OPC UA client certificate for the Unified Comfort Panel.
2. Install the self-signed certificate on the Panel.
3. Trust the OPC UA server on the Unified OPC UA client.
4. Trust the Unified OPC UA client on the OPC UA server.
• The engineering system automatically receives the server certificate and trusts it without
your having to take any action.
Introduction
Servers are available for the following OPC UA interfaces in WinCC Unified:
• OPC Unified Architecture: Access to the data management of WinCC Unified.
Licensing
If the OPC UA client should not be connected in anonymous mode, the "HMI Administrator" user
role must also be assigned to the user.
The "HMI Administrator" user role has system-defined "OPC UA - read and write access" function
rights.
The settings made must then be synchronized with the UMC on the Runtime computer. To do
this, import the user in UMC using the UMX. You can find additional information about this in the
User Management documentation.
How it works
The OPC UA server provides the following values:
• Process values
• Tag-based alarms
The OPC UA server supports only the "UA-TCP UA-SC UA Binary" communication profile. The used
port number is adjustable.
You can find additional information about configuration of the OPC UA server here:
• For Unified PC: In the section "Configuring a Unified OPC UA server (Unified PC) (Page 43)"
• For Unified Comfort Panel: In the section "Changing the security settings of the Unified OPC
UA server (Page 47)"
Supported specifications
OPC UA Architecture is a specification for the transmission of process values and alarms. The OPC
UA server supports the OPC UA specification 1.03. For additional information about supported
UA functions, refer to "OPC specifications and compatibility (Page 5)".
Parameter Description
HostName Placeholder for the computer name. Is used automatically
Port Port number. "4890" is set by default.
You can find information on disabling the OPCUA Local Discovery Server in Siemens Industry
Online Support (https://support.industry.siemens.com/cs/document/109749461/how-do-you-
disable-the-opcua-local-discovery-server-service-for-wincc-v7-and-wincc-tia-portal-?
dti=0&lc=en-WW) (Entry ID 109749461).
Note
Changes to the configuration file of the server only take effect when server is restarted.
Note
Storage location of the certificates
For a Unified PC as OPC UA server we discourage changing the settings of the storage location
in the server configuration file.
Introduction
The OPC UA security concept is based largely on:
• Authentication and authorization of the participating applications and users.
• Ensuring the integrity and confidentiality of messages exchanged between the applications.
Certificates
Certificates represent the authentication mechanism of OPC UA applications. Each application
has its own instance certificate and thereby identifies itself within the public key infrastructure.
The certificates used by the OPC UA server are stored via the settings in the configuration file
"OpcUaServerRTIL.xml":
NOTICE
Restricted access to the private key folder
In addition to the server itself and the system administrator, all other users and applications
have no access to the private key of the OPC UA server for security reasons.
Restricted access to the private key is therefore pre-configured after installing WinCC Unified.
The instance certificate generated during installation and the associated private key can be
replaced by the system administrator. In accordance with the respective security concept of the
plant, the new instance certificate may be self-signed or created by a certification authority.
The storage location for the instance certificate of the OPC UA server is determined by the server
configuration file:
In this case, the instance certificate of the server is in the directory "C:\ProgramData
\SCADAProjects\certstore\own\certs", the private key in the directory "C:\ProgramData
\SCADAProjects\certstore\own\private".
Examples:
• No OPC UA server instance certificate was generated during installation . This will be done
automatically during the initial server startup with "ForceCertificateCreation".
• An expired OPC UA server instance certificate is found when the server starts. The server
stops. Remove the expired certificate. A new certificate is automatically created at the next
server startup.
Parameter Meaning
StoreType Type of certificate storage. The storage is "Directory".
StorePath The certificates of trusted clients are stored under this folder.
In this case, the OPC UA server trusts all clients whose instance certificate is in the folder
"C:\ProgramData\SCADAProjects\Certstore\Trusted\Certs".
The authority certificates from certificate authorities that are required for the verification of a
client certificate chain are stored in the certificate store of the certificate authorities. The storage
location is determined by the server configuration file:
Parameter Meaning
StoreType Type of certificate storage. The storage is "Directory".
StorePath The certificates of trusted certification authorities are stored
under this folder.
Note
Certificates from the memory of the certification authorities are not automatically trusted.
For a certification authority to be trusted, its certificate must be located in the memory for
trusted certificates.
Sometimes the validation of the trusted certificates fails due to invalid client certificates
(certificate expired, invalid host name, etc.).
These known errors can be suppressed. To do this, enter the desired certificate validation options
in the XML configuration file of the server in <ValidationOptions>. The server will ignore the
suppressed error during the validation and the connection to the client will be established.
Note
Configure same validation options.
Use the same validation options for TrustedCertificateStore and IssuerCertificateStore.
In this case, the certificates of the trusted certification authorities are located in the folder
"C:\ProgramData\SCADAProjects\Certstore\trusted\certs".
To enable secure communication with this client, you will have to move the rejected certificate
to the certificate memory for trusted certificates.
Introduction
The following is ensured at the communication level:
• UA application authenticity
• The confidentiality of messages exchanged
• The integrity of messages exchanged
The security mechanisms used, for example, algorithms for encrypting and signing, are set in
standardized security policies.
You set the security policies supported by the OPC UA server in the configuration file of the server
in "ServerConfiguration" and "SecuredApplication".
ServerConfiguration
The XML element "SecurityPolicies" under "ServerConfiguration" contains the list of all available
"Security Profile" and "Message Security Mode" combinations for the server.
Note
Ensuring secure communication
Secure communication requires instance certificates for server and client and also a correct
configuration of the certificate store.
SecuredApplication
According to the OPC UA specification, security mechanisms are explicitly enabled or disabled
under the "SecuredApplication" with the "SecurityProfileUris" element.
The figure below shows a SecuredApplication for Unified PC:
With it the OPC UA server supports the security strategies "Basic256", "Basic128Rsa15" and
"Basic128Rsa15SHA256" in Runtime. Each with the Message Security Modes "Sign" and
"SignAndEncrypt". When communication is established, the UA clients select the required Policy
from this list.
User identity
In addition to the security mechanisms on the communication level, the OPC UA server also
supports authentication of the users of client applications using the UserTokenPolicy
"UserName". The client application must provide a valid combination of user name and
password when communication is established. This combination is checked by the UMC user
management.
The OPC UA server checks the UMC and whether the user has been assigned the global OPC UA
usage right "Read and write OPC UA".
The UserTokenPolicy is set in the configuration file of the OPC UA server.
With this configuration, the OPC UA server supports both anonymous users and the Policy
"UserName".
OPC UA services
The OPC UA server supports the functionality described below.
The following table sets out the functionality supported by OPC UA server 1.03:
Introduction
A WinCC Unified device that is used as an OPC UA server makes the following runtime data of its
system available to its OPC UA clients in its address space:
• Process values (WinCC Unified tags)
• Alarms (tag-based WinCC Unified alarms)
The address space of the OPC UA server is added below "Root > Objects" and has the following
hierarchical structure:
The following table shows the most important attributes of the OPC UA tags that represent a
WinCC Unified tag. You can find the complete list of attributes in the "OPC UA Part 3 - Address
Space Model 1.03 Specification" under paragraph "5.6":
Priority
For the configuration of the alarms in WinCC Unified, you select a priority between "0" and "255".
The OPC UA specification defines a value range between "1" for the lowest severity and "1000"
for the highest severity.
The value of the priority must therefore be selected to match the OPC UA severity. In a standard
mapping, the priority "0" is assigned to the OPC UA severity "1", and the priority "255" to the OPC
UA severity "1000". All other values are interpolated linearly between "0" and "1000".
The following table provides the most important properties of the OPC UA events and shows
how the WinCC Unified alarm system provides the information.
Note
Optional properties
Optional properties are sometimes not disclosed in the server address space.
Property Description
INSTANCEID Instance index used to reference an active multi-
instance alarm within the (configured) HmiAlarm.
ALARM Pointer to the corresponding HmiAlarm
ALARMCLASS Pointer to the alarm class
May differ from the alarm class reference of the
associated HmiAlarm.
ALARMCLASSSYMBOL Symbol (abbreviation) of the referenced alarm class
TEXTCOLOR Text color
BACKCOLOR Background color
FLASHING Flashing
SUPPRESSIONSTATE Indicates whether the alarm is reset, suppressed or
not suppressed.
ALARMTEXT1 Additional multilingual text1
ALARMTEXT2 Additional multilingual text2
ALARMTEXT3 Additional multilingual text3
ALARMTEXT4 Additional multilingual text4
ALARMTEXT5 Additional multilingual text5
ALARMTEXT6 Additional multilingual text6
ALARMTEXT7 Additional multilingual text7
ALARMTEXT8 Additional multilingual text8
ALARMTEXT9 Additional multilingual text9
ALARMPARAMETERVALUES1 Parameter value1
ALARMPARAMETERVALUES2 Parameter value2
ALARMPARAMETERVALUES3 Parameter value3
ALARMPARAMETERVALUES4 Parameter value4
Property Description
ALARMPARAMETERVALUES5 Parameter value5
ALARMPARAMETERVALUES6 Parameter value6
ALARMPARAMETERVALUES7 Parameter value7
ALARMPARAMETERVALUES8 Parameter value8
ALARMPARAMETERVALUES9 Parameter value9
ALARMPARAMETERVALUES10 Parameter value10
ALARMPARAMETERVALUES11 Parameter value11
ALARMPARAMETERVALUES12 Parameter value12
ALARMPARAMETERVALUES13 Parameter value13
ALARMPARAMETERVALUES14 Parameter value14
ALARMPARAMETERVALUES15 Parameter value15
ALARMPARAMETERVALUES16 Parameter value16
INVALIDFLAGS Indicator of invalid property values
Bit-by-bit interpretation
ORIGIN Dynamic alarm-instance-specific name of the
alarm-triggering object.
AREA Dynamic alarm-instance-specific name of the area
to which the alarm-triggering object belongs.
LOOPINALARM Function that is called to navigate from the alarm
control, for example, to the screen that shows the
source of the alarm or to an application that pro‐
vides more information.
COMPUTER Name of the machine that hosts the originator of
the alarm.
USER Name of the user associated with the event (oper‐
ator alarms only).
VALUE Current value at the time when the alarm became
active.
Updated value at the time the alarm became inac‐
tive.
VALUEQUALITY Current quality at the time when the alarm became
active.
VALUELIMIT Current limit at the time when the alarm became
active.
For dynamic limits: Updated limit at the time the
alarm became inactive.
DEADBAND Dead zone value of the alarm condition of an ana‐
log alarm at the time when the alarm became ac‐
tive.
CONNECTION Reference to the corresponding HMI connection
SYSTEMSEVERITY Severity for alarm-based system voting (redundan‐
cy)
SOURCETYPE Defines the alarm generation method
STATE The change of the current alarm condition, includ‐
ing history.
STATETEXT Textual representation of the alarm condition
Property Description
CHANGEREASON Reason for the change time, see Enumeration def‐
inition.
ACKTIME Timestamp of the time when the alarm was ac‐
knowledged at the source (or the service, in case
the alarm source does not provide an acknowledg‐
ment).
CLEARTIME Timestamp of the time when the alarm at the
source became inactive (or the service, in case the
alarm source does not provide date and time infor‐
mation).
RESETTIME Timestamp of the alarm reset time (or service, in
case the alarm source does not provide date and
time information).
USERRESPONSE The type of tag that represents a property of an‐
other node.
Tags
The WinCC Unified tags are displayed by OPC UA tags of the "HMISimpleTagType" type. Other
DataAccess tag types such as "AnalogItem" or "DiscreteType" are not supported.
The OPC UA server supports read access to the OPC UA tag attributes such as "DataType" or
"AccessLevel". Writing access and subscriptions are only supported for the "Value" attribute.
Monitoring alarms
OPC UA clients can monitor changes to the WinCC Unified alarms by subscribing to the server
object or directly to the runtime system for monitoring. A client can subscribe to one object
(server or runtime system) or several objects for monitoring.
When a configured alarm becomes active or a property of an active alarm changes, the OPC UA
client is automatically notified.
OPC UA clients can perform the following actions for monitored alarms:
Requirement
• The OPC UA server for WinCC Unified is running.
• A WinCC Unified Runtime project is running on the server.
Procedure
Follow these steps to export the tags of the active Runtime using the OPC UA server:
1. Start the "SIMATIC Runtime Manager" tool.
2. Click the button in the toolbar.
3. Configure the export settings in the "OPC UA Export" tab:
– Select the name and the folder of the XML file.
– Enter the name and password of the user who starts the export.
4. Click "Export".
Result
You can see whether the export was successful in the "Status" field.
If the export is successful, the XML is written to the specified folder.
For diagnostic purposes, a trace file is written to the following folder: [ProgramData]/Siemens/
Automation/Logfiles
See also
Requirements for use (Page 22)
Introduction
The OPC UA server is configured in the "OpcUaServerRTIL.xml" configuration file. This chapter
describes the layout of the configuration file.
File location
The project-specific "OpcUaServerRTIL.xml" configuration file is stored in the WinCC Unified
installation directory under:
"<WinCCUnified>\bin"
Layout
The configuration file is broken down into multiple sections.
<Secured Application>
<BaseAddresses> Configuration of the URL of the OPC UA server
<...></...> For additional information about the URL, refer to "Security concept of
</BaseAddresses>. OPC UA (Page 25)".
<SecurityProfileUris> Configuration of the supported security policies.
<SecurityProfile> For more information about security policies, refer to "Security concept
<...></...> of OPC UA (Page 25)".
</SecurityProfile>
...
</SecurityProfileUris>
<ApplicationCertificate> Revision of the default certificate configuration according to OPC UA
<TrustedCertificateStore> Specification / Part 6.
<TrustedCertificates> (optional)
<...>
</Secured Application>
<Server Configuration>
<SecurityPolicies> Configuration of the message security modes.
<SecurityPolicy> For more information about message security modes, refer to "Security
<...></...> concept of OPC UA (Page 25)".
</SecurityPolicy>
...
</SecurityPolicies>
<UserTokenPolicies> Configuration of user identification
<UserTokenPolicy> Use the "Anonymous" setting only for test and diagnostics purposes.
<...></...>
</UserTokenPolicy> For more information about message security modes, refer to "Security
... concept of OPC UA (Page 25)".
</UserTokenPolicies>
</Server Configuration
<DiscoveryRegistration> section
Settings for the Local Discovery Server (LDS) are made in this section.
<DiscoveryRegistration>
<MaxRegistrationInterval> Interval in milliseconds in which the OPC UA server attempts to reach
... the locally installed LDS.
</MaxRegistrationInterval> Default setting: 3000
<DiscoveryUrls> If LDS is not installed on the local computer but on another computer in
<Url>opc.tcp://[HostName]:4840</ the network, replace the [HostName] placeholder with the IP address of
Url> the remote computer.
</DiscoveryUrls> Example: <Url>opc.tcp://192.168.0.1:4840</Url>
</DiscoveryRegistration>
See also
Operating principle of the OPC UA server (Page 24)
3.2.3 Trace
WinCC Unified provides trace logging for error analysis. The OPC UA traces including SDK can be
logged for test purposes and for troubleshooting.
All trace outputs of the OPC UA server with "Fatal", "Error" or "Warning" severity are stored in LOG
files (.log) in the directory " C:\ProgramData\Siemens\Automation\Logfiles\WinCC_UA".
The relevant files start with "OpcUaServerRTIL". In case of problems you must send these files to
SIEMENS Customer Support.
TraceViewer
The log files can be viewed with the Trace Viewer. It is located in the installation directory of
WinCC Unified under "WinCCUnified\bin". To open the Trace Viewer start the file
"RTILtraceViewer.exe".
• The configuration of the UserTokenPolicy of the Unified OPC UA server only supports
anonymous communication.
• If you want to change the runtime configuration of the Unified Comfort Panel from a web
client (remote access): The device on which you open SIMATIC Extensions is in the network
to which the Panel is connected.
• The user who logs in to SIMATIC Extensions has the HMI Administrator role.
Procedure
1. Open SIMATIC Extensions:.
– Local on the Panel: In the Control Panel under "Apps", "SIMATIC Apps", select the "SIMATIC
Extensions" app.
– Remote on a web client: Connect to the Unified Comfort Panel with the runtime
configuration you want to change. To do this, enter the following string in the address line
of the browser:
https://<IP address of the Comfort Panel>/device/simatic-
extensions
2. If you use SIMATIC Extensions remotely:
– Download the SIMATIC Extensions root certificate to your device before the first login on
the login page.
– Install the certificate into the certificate store for trusted root certificates of your browser.
The steps to install the root certificate depend on the browser you are using. Proceed as
described in the user help of your browser.
3. Log in to SIMATIC Extensions .
4. Load a template file into the editor to configure the OPC UA server security settings.
Follow these steps:
– Click "Templates" in the editor toolbar.
– Select "OPC UA Security Settings" in the menu and then the desired template.
Alternatively, you can load a local YAML file via "Browse & View Configuration" .
5. In the Web Editor, configure the following OPC UA Server security settings of the Unified
Comfort Panel:
– The supported security policies
– The MessageSecurityModes that are supported for the enabled security policies
– The UserTokenPolicy that OPC UA Client users use to authenticate themselves to the
Unified OPC UA server
Use the YAML commands listed below to do this.
Note
Syntax and commands in the YAML file
Do not use tab characters.
7. Optional: To save your changes to the local YAML file, click "Download" in the editor
toolbar .
Note
Replace the pointed brackets with concrete values.
Example 1
Initial situation
The configuration of the Unified OPC UA Server supports the following security policies:
• "Basic128Rsa15"
• "Basic256"
The MessageSecurityModes "Sign" and "SignAndEncrypt" are enabled for both security policies.
Result
• The OPC UA Server security policy configuration is customized for the Panel:
– The configuration of the "Basic128Rsa15" security policy is updated.
– The configuration of the "Basic256Sha256" security policy is added.
• The configuration of the "Basic256" security policy is not changed.
• The communication between the OPC UA clients and the Unified OPC UA server is
anonymous.
Example 2
Initial situation
The Unified OPC UA Server is not configured.
Sign: true
SignAndEncrypt: true
- Basic256Sha256:
enabled: true
Sign: true
SignAndEncrypt: true
- Basic256:
enabled: true
Sign: true
SignAndEncrypt: true
- UserTokenPolicy:
- Anonymous
enabled: true
Result
• The security policies "Basic128Rsa15", "Basic256Sha256" and "Basic256" are enabled.
• They support the MessageSecurityModes "Sign" and "SignAndEncrypt".
• The communication between the OPC UA clients and the Unified OPC UA server is
anonymous.
Requirement
• In the engineering system, a WinCC project is open that has had a Unified device added to it.
• The "Connections" editor is open.
Procedure
Double-click in the "Add" cell and define the connection settings:
• "Communication driver": OPC UA
• Set the following parameters in the "Parameters" tab under "OPC server":
– "UA server discovery URL": Enter the OPC UA server IP and port
Use the following notation: opc.tcp://<IP>:<Port>
Alternatively, you can also determine the server via "Select OPC server".
– Select the desired security settings.
See also Defining the security settings for communication with the OPC UA server
(Page 54).
Result
The Unified OPC UA client uses the settings to establish a connection to the OPC UA server.
4.3 Defining the security settings for communication with the OPC UA
server
Requirement
A connection with the communication driver "OPC UA" is configured in a WinCC project on a
Unified device. See also section Defining connection settings to the OPC UA server (Page 53).
Procedure
Select the security settings that meet the requirements of the OPC UA server:
1. Open the "Connections" editor.
You make the security settings in the "OPC UA Server" area.
2. To protect the connection with a security policy, follow these steps:
– Select the security policy.
The communication with the server is protected by a certificate.
Note
Make OPC UA certificates available
Make sure that the required certificates are available on the OPC UA server and client. See
also Introduction to OPC UA certificates (Page 7).
Note
Connection without security policy
If you do not select a security policy, it is urgently recommended that the OPC UA server
and client are installed on the same device.
Note
Restrictions
• The OPC UA server is a SINUMERIK device.
• The OPC UA server is based on the OPC UA specification 1.03.
Requirement
• The OPC UA server alarm instances are available in a NodeSet XML file.
• You have access to the XML file on the device on which the engineering system is installed.
Procedure
1. In the engineering system, add a Unified HMI device to a WinCC project.
2. Set the connection settings to an OPC UA server for the HMI device.
See also section Defining connection settings to the OPC UA server (Page 53).
3. Import the XML file with the OPC UA server alarm instances into the WinCC project.
See also section Importing OPC UA server alarm instances (Page 56).
4. Generate HMI alarms for the OPC UA server alarm instances.
See also section Generating HMI alarms for OPC UA server alarm instances (Page 57).
5. Add a screen to the HMI device.
6. Place an alarm display on the screen.
7. Compile the HMI device in a Runtime project, load the Runtime project onto the HMI device
and start the project in Runtime.
Note
Loss of the ability to compile and load changes
If you load the OPC UA server alarm instances on the HMI device and then update the alarm
instances in the engineering, because the alarm class has been changed for example, you
lose the option in the engineering to compile and load only the changes to the project. The
project must now be fully compiled and loaded.
Result
In Runtime, the alarm instances received from the OPC UA server are displayed in the alarm
display. The following attributes are mapped to each other:
Requirement
• In the engineering system, a WinCC project is open that has had a Unified device added to it.
• The OPC UA server alarm instances are available in a NodeSet XML file.
• You have access to the XML file on the device on which the engineering system is installed.
Procedure
To import OPC UA server alarm instances into a WinCC project, follow these steps:
1. Open the "HMI alarms" editor.
2. Select the "OPC UA A&C" tab.
3. Under "Connection" in the right area, select the OPC UA connection.
4. Click "Import" next to "Connection":
Result
The content of the XML file is imported into the "OPC UA browser" area. It contains the
hierarchical OPC UA NodeSpace with the OPC UA server alarm instances.
Then generate HMI alarms for the OPC UA server alarm instances.
See also
Generating HMI alarms for OPC UA server alarm instances (Page 57)
Requirement
• In the engineering system a WinCC-project is open, to which a HMI device has been added.
• The "HMI alarms" editor of the device is open.
• An XML file with the OPC UA server alarm instances was imported into the editor.
Procedure
1. Select the "OPC UA A&C" tab.
2. Expand the objects in the "OPC UA browser" area up to the node under which the OPC UA
server alarm instances are located.
3. Press and hold the left mouse button to drag the node to the "Node ID" cell of the "Add" row
of the table in the "OPC UA types" area.
An entry for an alarm type is added to the table. The table provides detailed information on
the properties of the alarm type.
4. Select an alarm class that matches the alarm type of the OPC UA server alarm instances and
supports the state machine "Alarm without status active with acknowledgment".
5. In the "OPC UA types" area, click the button to generate and update the alarm instances:
Note
Loss of the ability to compile and load changes
If you load the OPC UA server alarm instances on the HMI device and then update the alarm
instances in the engineering, because the alarm class has been changed for example, you
lose the option in the engineering to compile and load only the changes to the project. The
project must now be fully compiled and loaded.
Result
HMI alarms are generated for the OPC UA server alarm instances.
When loading the project into a Runtime, the mapping between the HMI alarms and the OPC UA
server alarm instances are loaded into the target device.
See also
Importing OPC UA server alarm instances (Page 56)