Setting authorizations for machine access individually

Many industrial machines and systems may only be operated by authorized personnel and are therefore fitted with key-operated switches. However, if certain machine functions are only supposed to be available for a specific person or group, this cannot be achieved by using simple key-operated switches. In such a case, electronic switches with RFID technology enable a complex management of rights.
Technical specifications for SIRIUS ACT

Industry Mall

Use SIRIUS ACT ID key-operated switches to implement as many as 50 different authorizations

The ID key-operated switches of the SIRIUS ACT series use electronic locks instead of the conventional mechanical ones. The associated keys contain an RFID chip that makes them uniquely identifiable. The key and switch are plastic-coated and do not come into contact at the interface. Instead, they are connected by means of a stable 125 kHz radio link. The ID key-operated switches have four freely programmable digital outputs which can be used for four different authorizations, which can be individually combined to create as many as 50 different authorization levels. When a key is inserted, the key-operated switch enables the corresponding authorizations and indicates them with 4 LEDs. The machine operator can then turn the rotary switch smoothly to the required function, provided he or she has the corresponding authorization.

How can a complex authorization management be implemented with SIRIUS ACT?

There are two different versions of the ID key-operated switches: One version which can be used autonomously and one which communicates with the controller via IO-Link. The IO-Link connection is used for registering and precisely allocating the authorization levels in the Port Configuration Tool (PCT) or via the TIA Portal. After shipment of the plant, regardless of location, new keys can easily be added by means of their individual number and also subsequently modified. If an ID key (or tag) is lost, then it can simply be blocked and replaced. It is possible to detect whether a key is inserted on the controller side via a monitored output. In addition, operation, downtime or maintenance information can be recorded and evaluated with the aid of a database for safety or quality purposes.