Configuration 
  4.20 Security and protection 
TIM 1531 IRC 
Operating Instructions, 02/2018, C79000-G8976-C468-02 
97 
You can configure the following access levels: 
● 
Full access (no protection)
 
The configuration and the blocks can be read and modified by anybody. 
● 
 
With this access level, without entering the password, only read access to the hardware 
configuration and the blocks is possible; in other words, you cannot download the blocks 
or hardware configuration to the TIM without entering the password. Without the 
password, writing test functions and firmware updates are also not possible. 
● 
No access (complete protection)
 
If the module is completely protected, neither read nor write access to the hardware 
configuration and blocks is possible. 
If you want to use the functions of the unmarked access levels, you will need to enter a 
password. 
With the legitimization provided by using the password, you once again have full access to 
the module. 
Behavior of a password-protected module during operation 
Protection of the module is effective after the settings have been loaded on the module. 
Before an online function is executed, a check is made to establish whether or not it is 
permitted. If there is password protection, you will be prompted to enter the password. 
Example: 
The module was configured for read access and you want to use the "Modify tags" function. 
Since this is write access, the configured password must be entered before the function can 
be executed. 
The functions protected by the password can only be executed by one PG/PC at any one 
time. Another PG/PC cannot log on. 
The access rights to the protected data apply for the duration of the online connection or until 
the access rights are canceled again with "Online > Delete access rights". 
Each access level allows unrestricted access to certain functions even without entering a 
password, for example identification using the "Accessible devices" function. 
 
Configuring access protection 
Configuration 
You can enter several passwords setting up different access rights for different user groups. 
The passwords are entered in the table so that precisely one access level is assigned to 
each password. 
The "Access level" column shows how the password takes effect.