Industrial-Strength System Security and Stability
Built on Trusted Technologies
Ignition gives you all the tools necessary to make your system as secure as you need it to be. Ignition is built on a solid, unified architecture and proven, industrial-grade security technology, which is why industrial organizations all over the world have been trusting Ignition for years with their mission-critical systems.
Companies ThatUse Ignition:
Keep Your Data Secure with SSL Technology
Ignition supports modern protocols like SSL so you can seamlessly integrate your Ignition system with your existing security strategy. We know that your industrial data is vital to your business: that's why Ignition comes with the ability to safeguard your data with ultra-secure SSL technology. SSL is used by financial institutions all over the world to encrypt data and the communications channel it passes through.
Powerful Client Authentication
Ignition supports modern, web-based authentication strategies such as federated identity, multi-factor authentication (MFA), and single sign-on (SSO). With Ignition you can centralize identity management through trusted federated identity technologies such as SAML and OpenID Connect. Ignition gives you the power to assign user roles natively or to integrate with corporate network security using Microsoft Active Directory™. You can grant access to system areas for different users, and turn access on and off with the click of a button.
Keep Informed with Easy System Auditing
Ignition’s built-in user auditing gives administrators incredible insights about what is happening in the system, when and where it is happening, and who is doing what. This enables you to quickly resolve issues and mitigate costly downtime incidents.
Easily Control Security Settings
Ignition provides a wide degree of system control, putting you in the driver's seat of your security strategy. Security levels allow you to grant different permissions to users, operators, and officers. User roles give you control over who has access to a project and what they are able to do. You can fine-tune client security by giving individuals differing levels of access; you can even control access to individual tags.
Set Up Security by Location
Ignition's powerful security zones let you set up security rules based on location. Using security zones with user roles, you can control how and where a user can access the system, whether they are in a specific area on the plant floor or a remote site. Based on these zones, users can only access the system's functionality from assigned locations.
“With the Ignition SDK, we can put in our own protective measures and our own tracking. With our cloud server, we depend a lot on our firewalls and certificates. Ignition has played well with all of that with no problem.”
Tyrion Integration Services
- Dual-core processor
- 4 GB RAM
- 10 GB free HD space
- (Requirements vary by usage.)
Supported Operating Systems
- Windows Server 2008/2012/2016
- Windows 7, 8 and 10
- Ubuntu Linux (Supported by most popular distributions, tested with Ubuntu 12.4 or later)
- Microsoft® SQL Server
- IBM DB2
- Any database with a JDBC driver