StationMaskSys

Relevant only on workstations whereReadOnlyStation is set. Does not apply otherwise. A full discussion is provided in the topic, Read-Only Workstation.

The default system privilege mask for a read-only workstation does not grant the configuration privilege or the edit files privilege. If you configure the workstation you are using to be read-only, you will have no means to do further configuration at that workstation, or even to reverse that change. Your only recourse will be to move to another workstation on your system and use the Version Control system to reverse the change.
*******************************************************
*** DEFINING A WORKSTATION TO BE READ-ONLY ***
*** IS BEST DONE FROM ANOTHER WORKSTATION. ***
*******************************************************
(A remote connection using a VIC or Anywhere client does not count as working at another workstation. Do not proceed unless your application has a Client / Server Configuration)

This is a bitwise value that controls which system privileges are enabled at a read-only workstation. The privileges assigned to the operator will also apply. For a privilege to be accessible, it must be enabled for the operator as well as the workstation. This mask does not grant privileges to those who do not otherwise possess them. See also: StationMaskApp

StationMaskSys can be set in different layers of VTScada. The privileges of each layer will inherit the privileges of the parent layer before it. Privileges enabled or disabled at the VTS Library layer will be overwritten by privileges at the OEM layer and the result will be overwritten again at the Application layer.

In the following example, the bitwise value has been shortened to 8 bits for the sake of brevity.

If StationMaskSys is set to 11111111 at the VTS Library layer, 0000 at the OEM layer and 11 at the Application layer...

Then the value at the OEM layer will become 11110000 (taking the VTS Library layer and adulterating it with the OEM layer value) and....

Then the value at the Application layer will become 11110011 (taking the OEM layer value and adulterating it with the Application layer value).

Leaving the StationMaskSys set to Default

While there is a default value for this property, it will not be visible in your Application Configuration dialog.

The default is copied below for your convenience and can be used as a starting point when defining your own StationMaskSys. A comment is provided above the value to help you count the bits from right to left.

Section:  <SecurityManager-Admin>
;                60       50        40        30        20        10
;                0987654321098765432109876543210987654321098765432109876543210
StationMaskSys = 0000011010010100110000100001010000000100000000000101000000100

The default value permits only the following privileges. The signed on operator must also posses these privileges, because setting a privilege in the station mask does not grant that privilege to any operator who has not already been granted it.

(The following refers to the default value, as shown in the example.)

2 - Account Modify

9 - Application Stop

11 - Tag Parameter View

23 - Thin Client Access

31 - Alarm Page Access

33 - History Page Access

38 - Page Note Hide

43 - Sites Page Access

44 - Maps Page Access

49 - Global Tag & Area Filter

52 - Recipe Page Access

54 - Remote Tag Value/History Retrieve

55 - Service Page Access

As new privileges become available, their default value will be provided.

Setting customized privileges with StationMaskSys

When setting a custom StationMaskSys value be aware that any missing bits will be padded on the end with a 1, enabling those privileges.

As new privileges are added the bitwise length will inevitability change. If your custom StationMaskSys value is shorter than the new default, the missing bits will default as enabled until the value is updated. No matter what the default value of the new privilege is in a default StationMaskSys, it will be enabled in an unchanged custom StationMaskSys value.

Bit Number

System Privilege

0

Configure

1

Account View

2

Account Modify

3

Accounts Manager

4

Security Administrator

5

Alarm Disable

6

Manual Data

7

Questionable

8

Alarm Acknowledge

9

Application Stop

11

Tag Parameter View

14

Edit Files

15

Deploy Changes

16

Revert Changes

17

Page Add

18

Page Modify

19

Page Delete

20

Tag Add/Copy

21

Tag Modify

22

Tag Delete

23

Thin Client Access

24

Alarm Mute

25

Alarm Silence

26

Group Modify

27

Group Save

28

Group Delete

29

Pen Modify

30

Note Add

31

Alarm Page Access

32

Reports Page Access

33

History Page Access

34

Deprecated

35

Thin Client Monitor Access

36

Thin Client Monitor Admin

37

Page Note Edit

38

Page Note Hide

39

Advanced Version Control

40

Application Manager View

41 Manage Tag Types
42 Alarm Shelve
43 Sites Page Access
44 Maps Page Access
45 Operator Notes Page Access
46 Edit Data
47 Remote Data Access
48 Control Outputs
49 Global Tag & Area Filter
50 Change recipes
51 Start recipe batches
52 Open the Recipe & Batch Management Page
53 Edit contacts in Roster tags.
54 Restricts access to the main History table when making remote queries.
(Access to defined SQL Views can permitted on a tag-by-tag basis.)
55 User may access the Services page
56 User may force a service to change servers
57 User can create Control Locks and can remove Control Locks over which the user has "ownership"
58 User can remove any Control Lock
59  
60 Able to release a control token from any tag.