Operational performance depends on the ability of operators to manage effectively the operation of an installation and to react appropriately in the event of any drift. To achieve this, the control interfaces must be designed to give operators an accurate understanding of the situation at hand. In other words, the HMIs must be efficient and user friendly.
With a high-performance Human-Machine Interface
An application’s HMI includes all the display elements of a “conventional” or “mobile” SCADA application. Thanks to a powerful 100% vector graphics engine, you enjoy the freedom to develop user-friendly HMIs that will help the daily lives of your operators (both in the control room and also in the field via mobile devices).
A HMI is used for the following two functions:
- Display: graphic representation, for an operator, of information coming from the controlling automation systems
- Controls: to enable the operator to control the installation (in the case of a SCADA system, these are digitized control points).
The components of a HMI in Panorama E2 feature:
- Views of the application: mimic diagrams with objects such as alarm windows, trend drawings, etc.
- Navigation: mechanisms allowing the operator to display the Views on the workstation,
- Access control: graphic elements to channel the operators’ actions according to their permissions,
- Operational context: control over the workstation initialization and in particular the main view displayed at startup.
With sound user management and access control
This functionality allows you to identify and authenticate users of the application on the SCADA stations (conventional HMI) or on mobile devices (mobile HMI), by assigning permissions or profiles to users (access levels, authorized areas or functions).
Well thought-out user management and rigorous access control are basic elements of a SCADA solution compliant with a premier level of Cybersecurity.
Users are defined in a directory, which may be of three types:
- A directory of Panorama E² users defined in the configuration of the application,
- An “external” directory such as Active Directory or LDAP,
- A directory of local Windows users (Workgroup), local to each workstation.
Access control for each user is based on:
- Access restrictions configured on elements within the application,
- Access permissions assigned to users through their Profiles