InteliLite4 AMF20 Global Guide
165
Untrusted
General-purpose interfaces, which may be exposed to public networks, such as the Internet, are
untrusted. The communication is running through networks which are not under control of the entity
who operates the controller. Thus, strict cybersecurity rules must apply for this type of interface.
Untrusted interface are Ethernet and cellular module.
5.6.2 User accounts
User account must be created in the controller by an administrator before the particular user can login to the
controller.
Note: User accounts must be created for each controller separately and manually. It is not possible to
transfer the accounts from one controller to another.
Username
Consists of 6-15 alphanumeric characters, must contain at least 1 letter. This
is the main identifier of the particular user account.
Password
Consists of 6-15 alphanumeric characters, must contain at least 1 letter and 1
digit. This is the password that is used together with user name to authenticate
(log-in).
User identifier (UID)
Optional 4-digit identification string which can be used for simplified login at
trusted interfaces (e.g. from InteliVision display when connected via Ethernet.
PIN 4-digit “password” to be used together with UID.
Access level Determines Access to controller data (page 173)
User account must have the following properties
Implicit account
At trusted interfaces there is an implicit user automatically logged-in at any time if no other explicit user is
logged-in at the respective interface. This allows terminal devices (e.g. internal display) to show controller
values even without the need for a specific person to be logged-in.
The implicit account is fixedly defined in the firmware.
The implicit account has fixed access level 0, unless production mode is activated (see Production
mode on page 166).
Implicit user is logged in any time no other user is logged in at the respective interface.
User login
To login to the controller the username and password must be provided into the login form of the
application (InteliConfig (page 13), WebSupervisor (page 13) and Remote Display (page 95).
Alternatively, at trusted interfaces, it is possible to login using UID and PIN instead of username and
password. This method of login is designed to simplify the login procedure at devices without alphanumeric
keyboard (e.g. InteliVision).
Note: The controller is featured with a protection against brute force attack to user account credentials. For
details see Account break protection on page 172.