Security model overview

Along with authentication methods and password strengths, a station’s security is determined by the combination of categories, users, and permissions, as shown in shown in Figure 260.

NoteIn general, you create needed categories first, then assign objects to them. Then create users, to which you assign permissions. However, you can engineer security in any order you want.

Figure 260. Station security includes categories, users, permissions


Station security includes categories, users, permissions

The following sections explain the various aspects of station security: