Role based access control to the controller
The administrator can determine which rights users have.

We recommend granting access only to trained personnel. An enabled SSH access allows programming that may bypass mechanisms that Weidmüller Interface GmbH & Co.KG has built in to protect against destructive operations.
Role / access rights | SSH access | Root privileges | Access to all functions |
|---|---|---|---|
Administrator | x | x | x |
User with root privileges | x | x | |
User | x |