-

Passwords

Each (human) users of a system component needs to be identified and authenticated for all access. For that purpose, passwords can be used.

Further authentication methods can be, for example, biometrics (e.g. finger print scanner, face recognition), tokens, physical keys, key cards or evaluating the geographic location of the user.

Hinweis
According to the IEC 62443 standard, ICS network components should implement multifactor authentication for all human users who will have access. For implementing multifactor authentication, several authentication methods can be combined.

You must set up a User and Role Management accordingly. There, authorizations are granted to each user role which define the access type and permitted operations to system components or data.

Password rules

Uses cases

Practical use cases for authentication using passwords