
Advanced Channel Access Security Lab Procedure for Experts
Explore a detailed procedure for building, running, and modifying an IOC application with access security restrictions. Learn how to enable, disable, and verify access security settings to protect critical data.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Channel Access Security Lab John Sinclair ORNL/SNS sinclairjw@ornl.gov January 2019 Managed by UT-Battelle for the Department of Energy
Procedure Summary Build and run the IOC application Note that there are no restrictions on modifying one:limit Reconfigure IOC application with access security, rebuild and run Note that only user expert may modify the above PV when security is enabled Disable access security and verify no restrictions 2 Managed by UT-Battelle for the Department of Energy
Details (1/4) Open three terminal windows Window 1 - build and run the IOC application cd /home/training/epics-train/jwsExamples/caSecurity make cd iocBoot/iocasExample1 chmod +x st.cmd ./st.cmd Window 2 modify one:limit caput one:limit 5 Note that write access succeeds caget one:limit Window 3 used later 3 Managed by UT-Battelle for the Department of Energy
Details (2/4) Window 1 reconfigure IOC with access security exit cd ../.. Edit the following files and uncomment related content search for ACC SECURITY asExample1App/Db/one.db 5 lines iocBoot/iocasExample1/st.cmd 2 make clean uninstall make 4 Managed by UT-Battelle for the Department of Energy
Details (3/4) Window 1 - start the IOC application cd iocBoot/iocasExample1 ./st.cmd Window 2 attempt to modify one:limit caput one:limit 5 Note that write access fails caget one:limit Window 3 modify as user expert sudo s su l expert caput one:limit 5 Note that write access succeeds caget one:limit 5 Managed by UT-Battelle for the Department of Energy
Details (4/4) Window 2 disable access security the write PV caput one: accessState Disabled caput one:limit 5 Note that write access now succeeds caget one:limit 6 Managed by UT-Battelle for the Department of Energy