Section 5 Central Account Management........................................41
Introduction.......................................................................................41
Certificate management
................................................................... 42
Creating IED certificates..............................................................42
Importing and writing certificates to an IED................................. 44
Reading certificates from an IED.................................................47
Certificate information on local HMI.............................................49
Invalid certificates ....................................................................... 52
Deleting certificates from an IED................................................. 52
Activation of Central Account Management..................................... 54
Manual configuration of Central Account Management...............59
Reading configuration from IED.................................................. 60
Deactivation of Central Account Management from PCM600..... 61
Deactivation of Central Account Management on local HMI....... 62
Authorization with Central Account Management enabled IED........63
Predefined user roles....................................................................... 66
Password policy settings for Central Account Management
enabled IED......................................................................................68
PCM600 access to Central Account Management enabled IED...... 68
Changing password.....................................................................69
Error messages........................................................................... 70
Trouble shooting Central Account Management.............................. 72
Section 6 User activity logging....................................................... 79
Activity logging protocol....................................................................79
Activity logging ACTIVLOG.............................................................. 79
Settings.............................................................................................79
Generic security application GSAL...................................................80
Security alarm SECALARM..............................................................80
Signals.........................................................................................81
Settings........................................................................................81
About Security events.......................................................................81
Event types.......................................................................................82
Section 7 Local HMI use................................................................ 85
Logging on........................................................................................85
Logging off........................................................................................88
Saving settings................................................................................. 88
Maintenance menu........................................................................... 89
Recovering password.................................................................. 89
Fallback access........................................................................... 91
Restore points............................................................................. 92
Section 8 Standard compliance statement.....................................95
Table of contents
2 670 series 2.2 IEC
Cyber security deployment guideline