Introduction
The TwinCAT 3 Engineering is equipped with various functions for the protection of the PLC application software:
- Configurable access restrictions to the PLC source code through the definition of user groups and the assignment of access levels ("Object Protection Level")
- Know-how protection through encryption of PLC source code and boot file
- Cloning protection through the use of the TwinCAT 3 license technology for the OEM application software (requires a Beckhoff IPC/EPC or TwinCAT 3 dongle)
Through the use of the TwinCAT 3 license technology the OEM can additionally generate licenses himself for functional extensions of his application software and market them (requires a Beckhoff IPC/EPC or TwinCAT 3 dongle).
These functions are currently only available for the PLC area of TwinCAT 3. |
An OEM certificate signed by Beckhoff is required in order to be able to use the functions to protect the application software. You can find details in the chapter TwinCAT OEM certificates.
The central switching point of the access protection is a user database.
Contents
This section provides general information on the system requirements, the software access protection, the user database and the software protection configurator. | |
This section provides you with a quick introduction to the two most important topics: | |
This section describes how you can apply for, install and extend the OEM certificate required to protect application software. | |
This section describes how to create user databases and connect them with the project. | |
This section describes how to protect the OEM application software. In particular, the subjects of user access rights, encryption, signing and OEM application licenses are explained in detail. |