Security changes and notes

In AX-3.8, station security continues with improvements over prior releases, including the “update 1” release for AX-3.7 (in this document “AX-3.7u1”).

Station security features introduced in the original AX-3.7 release continue in the AX-3.8 release. You can require users to reset their password upon next logon, define periodic password expirations (prompting users to change their passwords), and specify a “password history” limit to prevent reuse of old passwords. By default, “strong passwords” in a UserService are in effect, with default minimum values of password length 10, upper case 1, lower case 1, digits (numerals) 1, and special characters 0 (none). The Workbench “New Station” wizard uses these particular defaults; however, once a station is created you can change its definition of strong passwords if needed.

Finally, as in AX-3.7, most NiagaraAX hosts can be configured for secure, encrypted (SSL or TLS) connections for all types of Niagara access, including station (Fox) connections, browser access, or platform connections. Note this PKI certificate-based server authentication occurs before station login, and is SSL encrypted. In an SSL connection attempt, if a user “rejects” an untrusted or unknown certificate at the warning, the Niagara login dialog is never reached. For complete details, refer to the NiagaraAX SSL Connectivity Guide.