The RoleSet Objectdefined in Table 2is used to publish all Rolessupported by the Server.
BrowseName |
RoleSet |
||||
References |
NodeClass |
BrowseName |
DataType |
TypeDefinition |
Modelling Rule |
ComponentOf the ServerCapabilities Objectdefined in OPC 10000-5 |
|||||
HasTypeDefinition |
ObjectType |
RoleSetType |
|
|
|
HasComponent |
Object |
Anonymous |
|
RoleType |
|
HasComponent |
Object |
AuthenticatedUser |
|
RoleType |
|
HasComponent |
Object |
Observer |
|
RoleType |
|
HasComponent |
Object |
Operator |
|
RoleType |
|
HasComponent |
Object |
Engineer |
|
RoleType |
|
HasComponent |
Object |
Supervisor |
|
RoleType |
|
HasComponent |
Object |
ConfigureAdmin |
|
RoleType |
|
HasComponent |
Object |
SecurityAdmin |
|
RoleType |
|
Conformance Units |
|||||
Security Role Server Base 2 |
Serversshould support the well-known Roleswhich are defined in OPC 10000-3.
The default Identitiesfor the Anonymous Roleshould be Identitieswith the criteriaType IdentityCriteriaType.Anonymousand the criteriaType IdentityCriteriaType.AuthenticatedUser.
The default Identitiesfor the AuthenticatedUser Roleshould be an identity with the criteriaType IdentityCriteriaType.AuthenticatedUser.
The additional definition for the conformance units of the instances are defined in Table 3.
Table 3– RoleSet Additional Conformance Units
BrowsePath |
Conformance Units |
||
AddRole |
Security Role Server Management |
||
RemoveRole |
Security Role Server Management |
||
ConfigureAdmin |
Security Role Well Known |
||
SecurityAdmin |
Security Role Well Known |
||
Anonymous |
Security Role Well Known Group 2 |
||
AuthenticatedUser |
Security Role Well Known Group 2 |
||
Observer |
Security Role Well Known Group 3 |
||
Operator |
Security Role Well Known Group 3 |
||
Engineer |
Security Role Well Known Group 3 |
||
Supervisor |
Security Role Well Known Group 3 |
||
|
Security Role Server IdentityManagement |
||
|
Security Role Server IdentityManagement |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server IdentityManagement |
||
|
Security Role Server IdentityManagement |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server IdentityManagement |
||
|
Security Role Server IdentityManagement |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server IdentityManagement |
||
|
Security Role Server IdentityManagement |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server IdentityManagement |
||
|
Security Role Server IdentityManagement |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server IdentityManagement |
||
|
Security Role Server IdentityManagement |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server IdentityManagement |
||
|
Security Role Server IdentityManagement |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server IdentityManagement |
||
|
Security Role Server IdentityManagement |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Applications |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |
||
|
Security Role Server Restrict Endpoints |