Setting authorizations for machine access individually
Many industrial machines and systems may only be operated by authorized personnel and are therefore fitted with key-operated switches. However, if certain machine functions are only supposed to be available for a specific person or group, this cannot be achieved by using simple key-operated switches. In such a case, electronic switches with RFID technology enable a complex management of rights.
Use SIRIUS ACT ID key-operated switches to implement as many as 50 different authorizations
The ID key-operated switches of the SIRIUS ACT series use electronic locks instead of the conventional mechanical ones. The associated keys contain an RFID chip that makes them uniquely identifiable. The key and switch are plastic-coated and do not come into contact at the interface. Instead, they are connected by means of a stable radio link.
The ID key-operated switches have 4 freely assignable digital outputs. These can be used for control purposes for 4 different levels of authorization, to each of which a colored key is assigned. 4 keys are thus available for differentiating between the levels of authorization. Green stands for authorization or switch position 1, yellow for 2, red for 3, and blue for authorization level 4. An additional white key can be configured to the customer's requirements. When a key is inserted, the key-operated switch enables the corresponding authorizations and indicates them with 4 LEDs. The machine operator can then turn the rotary switch smoothly to the required function, provided he or she has the corresponding authorization.
How can a complex authorization management be implemented with SIRIUS ACT?
There are two different versions of the ID key-operated switches: One version which can be used autonomously and one which communicates with the controller via IO-Link. The IO-Link connection is used for registering and precisely allocating the authorization levels in the Port Configuration Tool (PCT) or via the TIA Portal. After shipment of the plant, regardless of location, new keys can easily be added by means of their individual number and also subsequently modified. If an ID key (or tag) is lost, then it can simply be blocked and replaced. It is possible to detect whether a key is inserted on the controller side via a monitored output. In addition, operation, downtime or maintenance information can be recorded and evaluated with the aid of a database for safety or quality purposes.
It looks like you are using a browser that is not fully supported. Please note that there might be constraints on site display and usability.
For the best experience we suggest that you download the newest version of a supported browser: