If there is no industrial information security, it is impossible to achieve security automation. When it comes to industrial information security, it is an inescapable topic to enter management.
Because the needs of people with different functions to access plants and equipment are varied, what users need is a flexible system that can adapt to their various needs to prevent unauthorized access. This system focuses on the maintenance of permissions, which can be achieved through the appropriate software/hardware tools.
Simple and flexible rights management system PITreader
PITreader is such a flexible system that can clearly control plant and equipment access. The operator of the equipment has a key that matches their operation authority. When the key is inserted into the PITreader, the system will automatically recognize the authority of the key and authorize it accordingly. A small key doesn’t look like anything special, but it can be set according to a complex permission matrix or specification within the company, and contains big content.
How is the data information written to the key?
Using the integrated PITreader web server, users can easily program the associated PITredaer transponder keys to store user data and operation permissions on them. All information, including some important Settings, can be performed directly on the PITreader, which speeds up debugging, including interface configuration.
After the key is set, an important role for the manager is to maintain and keep the permissions up to date. The PTM(PIT Transponder Manager) helps managers do this very well: in a graphical interface, managers can manage user Settings, blacklists, and user data related to the PITreader key. Thanks to the pre-configured templates that come with the system, individual user permissions can be written to the PITreader key in just a few steps, and the import function allows information to be quickly read directly into the integrated database.
How to manage multiple PITreader units in a company?
If multiple PITreader read units are used within a company, they can be managed using the User Authentication Service (UAS). It can connect the company’s management system such as PTM or other different user management software with PITreader. UAS has a central authorization database for users, so you can import and assign data from PTM, and even assign blacklists to all Pitreaders. Administrators can view the current status of all PITreader read units and display a list of diagnoses. Even with multiple PITreder read units, you can get a quick overview.
From a single device to multiple machines around the world, these advanced digital tools make it easy to apply and manage an efficient access and authorization management system based on PITreader.