StationMaskSys
Relevant only on workstations whereReadOnlyStation is set. Does not apply otherwise. A full discussion is provided in the topic, Read-Only Workstation.
This is a bitwise value that controls which system privileges are enabled at a read-only workstation. Operators signed in at that workstation must also possess each enabled privilege. This mask does not grant privileges to those who do not otherwise possess them. See also: StationMaskApp
The default system privilege mask for a read-only workstation does not grant the configuration privilege or the edit files privilege. If you configure the workstation you are using to be read-only, you will have no means to do further configuration at that workstation, or even to reverse that change. Your only recourse will be to move to another workstation on your system and use the Version Control system to reverse the change.
*******************************************************
*** DEFINING A WORKSTATION TO BE READ-ONLY ***
*** IS BEST DONE FROM ANOTHER WORKSTATION. ***
*******************************************************
(A remote connection using a VIC or Anywhere client does not count as working at another workstation. Do not proceed unless your application has a Client / Server Configuration)
While there is a default value for this property, it will not be visible in your Application Configuration dialog.
The default is copied below for your convenience and can be used as a starting point when defining your own StationMaskSys. A comment is provided above the value to help you count the bits from right to left.
Section: <SecurityManager-Admin> ; 40 30 20 10 ; 98765432109876543210987654321098765432109876543210
StationMaskSys = 10100110000100001010000000100000000000101000000100
The default value permits only the following privileges. The signed on operator must also posses these privileges, because setting a privilege in the station mask does not grant that privilege to any operator who has not already been granted it.
(The following refers to the default value, as shown in the example.)
2 - Account Modify
9 - Application Stop
11 - Tag Parameter View
23 - Thin Client Access
31 - Alarm Page Access
33 - History Page Access
38 - Page Note Hide
43 - Sites Page Access
44 - Maps Page Access
49 - Global Tag & Area Filter
Bit Number |
System Privilege |
---|---|
0 |
Configure |
1 |
Account View |
2 |
Account Modify |
3 |
Accounts Manager |
4 |
Security Administrator |
5 |
Alarm Disable |
6 |
Manual Data |
7 |
Questionable |
8 |
Alarm Acknowledge |
9 |
Application Stop |
11 |
Tag Parameter View |
14 |
Edit Files |
15 |
Deploy Changes |
16 |
Revert Changes |
17 |
Page Add |
18 |
Page Modify |
19 |
Page Delete |
20 |
Tag Add/Copy |
21 |
Tag Modify |
22 |
Tag Delete |
23 |
Thin Client Access |
24 |
Alarm Mute |
25 |
Alarm Silence |
26 |
Group Modify |
27 |
Group Save |
28 |
Group Delete |
29 |
Pen Modify |
30 |
Note Add |
31 |
Alarm Page Access |
32 |
Reports Page Access |
33 |
History Page Access |
34 |
Deprecated |
35 |
Thin Client Monitor Access |
36 |
Thin Client Monitor Admin |
37 |
Page Note Edit |
38 |
Page Note Hide |
39 |
Advanced Version Control |
40 |
Application Manager View |
41 | Manage Tag Types |
42 | Alarm Shelve |
43 | Sites Page Access |
44 | Maps Page Access |
45 | Operator Notes Page Access |
46 | Edit Data |
47 | Remote Data Access |
48 | Control Outputs |
49 | Global Tag & Area Filter |
50 | Change recipes |
51 | Start recipe batches |
52 | Open the recipe page |
53 | Edit contacts in Roster tags. |
54 | Restricts access to the main History table when making remote queries. (Access to defined SQL Views can permitted on a tag-by-tag basis.) |
55 | User may access the Services page |
56 | User may force a service to change servers |
57 | User can create Control Locks and can remove Control Locks over which the user has "ownership" |
58 | User can remove any Control Lock |
59 | |
60 | Able to release a control token from any tag. |