Extensions for user databases

Extensions for user databases 1:

Requirement: TwinCAT 3 Build 4024.8 or higher

The functions described below require at least TwinCAT 3 Build 4024.8.

Extensions for user databases 2:

Directory for storing user databases

User databases must be stored in the following directory in order to be used in the TwinCAT Engineering: C:\TwinCAT\3.1\CustomConfig\UserDBs

Extensions for user databases 3:

Allow operating system access for authorized users only

The content of the user database is protected against manipulation with a signature. The names of groups, object protection levels and users are not encrypted and could be read. Access to the IPC should be restricted to authorized users via the operating system.

Introduction

From Build 4024.8 onwards, the TwinCAT Software Protection supports extension files for the user database, so-called "User DB Extensions".

Notice A secure time limitation requires a tamper-proof time reference.

Application:

A user database can easily be replaced by another version (with the same name and user DB key) at file level. To make changes in the user database tamper-proof (protection against being replaced by an older version without the changes), a completely new user database (with a different User DB key) would have to be created and linked to the project again. However, this is often not feasible in practice. This can be solved easily and elegantly with extensions of the user database:

Notice In simple scenarios (few users) this could also be solved with a time-limited user database (without the use of extensions). However, for more complex scenarios, especially in the service area, this is not a practical solution.

Scenarios with different user groups / Object Protection Levels are simpler to realize with extensions. For example, in-house developers can be summarized in their own extension, which is simply not copied to the target system during delivery. This allows areas (or individual users) to be added or removed as needed without having to adapt the entire user database.

This also enables a significant simplification of the versioning of a user database.

Sample application from the service area

Extensions for user databases 4:

Time limitation of a user database / extension

A tamper-proof time limitation requires a tamper-proof time reference!