Professional Documents
Culture Documents
CAE Documentation: Cybersecurity Admin Expert
CAE Documentation: Cybersecurity Admin Expert
Documentation
Cybersecurity Admin Expert
CAE/EN UG/E20
07/2018
User Guide
CAE 1.7.8
www.schneider-electric.com
USER GUIDE CAE/EN UG/E20
CAE Documentation Page 3/141
CHAPTERS
SAFETY (SA)
INTRODUCTION (IT)
INSTALLATION (IN)
OPERATING (HI)
CYBERSECURITY (CS)
TROUBLESHOOTING (TG)
GLOSSARY (LX)
USER GUIDE CAE/EN UG/E20
CAE Documentation Page 4/141
USER GUIDE CAE/EN UG/E20
CAE Documentation Page 5/141
FIGURES
FIGURE 1: CAE APPLICATION 17
FIGURE 2: CAE IN A SECURED INDUSTRIAL SYSTEM (EXAMPLE) 18
FIGURE 3: EXAMPLE OF MULTI-LAN SYSTEMS ARCHITECTURE 48
FIGURE 4: RBAC ROLE STRUCTURE 49
FIGURE 5: CAE ICON 52
FIGURE 6: LOGIN PAGE 53
FIGURE 7: CAE FIRST RUNNING 54
FIGURE 8: CAE WORKSPACE 55
FIGURE 9: CAE ELEMENT TO SECURE 57
FIGURE 10: CAE SECURITY CONFIGURATION 58
FIGURE 11: SECURITY CONFIGURATION – USER PARAMETERS 59
FIGURE 12: SECURITY CONFIGURATION – LOGS PARAMETERS 60
FIGURE 13: SECURITY CONFIGURATION – SECURITY PARAMETERS 61
FIGURE 14: CERTIFICATES LIST 63
FIGURE 15: FIELD CHOOSER FOR CERTIFICATE LIST 63
FIGURE 16: CONFIGURATION OF CENTRALIZED AUTHENTICATION (COMMON PART) 66
FIGURE 17: CONFIGURATION CENTRALIZED AUTHENTICATION FOR RADIUS CLIENTS 68
FIGURE 18: CAE WORKSPACE 71
FIGURE 19: USER ACCOUNT LIST 73
FIGURE 20: USER ACCOUNT LIST – FIELD CHOOSER 73
FIGURE 21: USER ACCOUNT LIST – SORTING BY TITLE 74
FIGURE 22: USER ACCOUNT LIST – FILTERING BY TITLE 74
FIGURE 23: USER ACCOUNT CREATION 76
FIGURE 24: USER ACCOUNT REMOVAL 77
FIGURE 25: GLOBAL SECURITY VIEW BY USER 78
FIGURE 26: GLOBAL SECURITY VIEW BY ROLE 78
FIGURE 27: DEFAULT SCOPE EDITION 79
FIGURE 28: DEFAULT SCOPE SHOWING 79
FIGURE 29: GLOBAL SECURITY – ADD NEW USER ACCOUNT 81
FIGURE 30: GLOBAL SECURITY – ASSOCIATE USER ACCOUNT TO ROLE(S) 82
USER GUIDE CAE/EN UG/E20
CAE Documentation Page 6/141
CONTENT
1. INTRODUCTION 10
2. SAFETY 11
2.1 Safety Information ................................................................................................................ 11
3. GUARANTEES 12
4. COPYRIGHTS & TRADEMARKS ............................................. 13
4.1 Copyrights ............................................................................................................................ 13
4.2 Trademarks ........................................................................................................................... 13
1. INTRODUCTION
This document is a chapter of the Cybersecurity Admin Expert (CAE) manual. It describes the safety, handling,
packing and unpacking procedures applicable to CAE software.
SAFETY AND HANDLING CAE/EN SA/E20
CAE Documentation Page 11/141
2. SAFETY
2.1 SAFETY INFORMATION
Important information
Read these instructions carefully and look at the equipment to become familiar with the device
before trying to install, operate, service or maintain it. The following special messages may appear
throughout this bulletin or on the equipment to warn of potential hazards or to call attention to
information that clarifies or simplifies a procedure.
The addition of either symbol to a “Danger” or “Warning” safety label indicates
that an electrical hazard exists which will result in personal injury if the
instructions are not followed.
This is the safety alert symbol. It is used to alert you to potential personal injury
hazards. Obey all safety messages that follow this symbol to avoid possible
injury or death.
DANGER
DANGER indicates a hazardous situation which, if not avoided, will result in death or serious
injury.
WARNING
WARNING indicates a hazardous situation which, if not avoided, could result in death or
serious injury.
CAUTION
CAUTION indicates a hazardous situation which, if not avoided, could result in minor or
moderate injury.
NOTICE
NOTICE is used to address practices not related to physical injury. The safety alert symbol shall
not be used with this signal word.
Please note
Electrical equipment should be installed, operated, serviced, and maintained only by qualified
personnel. No responsibility is assumed by Schneider Electric for any consequences arising out of
the use of this material.
A qualified person is one who has skills and knowledge related to the construction, installation, and
operation of electrical equipment and has received safety training to recognize and avoid the
hazards involved.
SAFETY AND HANDLING CAE/EN SA/E20
CAE Documentation Page 12/141
3. GUARANTEES
The media on which you received SCHNEIDER ELECTRIC software are guaranteed not to fail executing
programming instructions, due to defects in materials and workmanship, for a period of 90 days from date of
shipment, as evidenced by receipts or other documentation.
SCHNEIDER ELECTRIC will, at its option, repair or replace software media that do not execute programming
instructions if SCHNEIDER ELECTRIC receive notice of such defects during the guaranty period. SCHNEIDER
ELECTRIC does not guaranty that the operation of the software shall be uninterrupted or error free.
A Return Material Authorization (RMA) number must be obtained from the factory and clearly marked on the package
before any equipment acceptance for guaranty work.
SCHNEIDER ELECTRIC will pay the shipping costs of returning to the owner parts, which are covered by warranty.
SCHNEIDER ELECTRIC believes that the information in this document is accurate. The document has been carefully
reviewed for technical accuracy. In the event that technical or typographical errors exist, SCHNEIDER ELECTRIC
reserves the right to make changes to subsequent editions of this document without prior notice to holders of this
edition. The reader should consult SCHNEIDER ELECTRIC if errors are suspected. In no event shall SCHNEIDER
ELECTRIC be liable for any damages arising out of or related to this document or the information contained in it.
Expect as specified herein, SCHNEIDER ELECTRIC makes no guaranties, express or implied and specifically
disclaims and guaranties of merchantability or fitness for a particular purpose.
This limitation of the liability of SCHNEIDER ELECTRIC will apply regardless of the form of action, whether in contract
or tort, including negligence. Any action against SCHNEIDER ELECTRIC must be brought within one year after the
cause of action accrues. SCHNEIDER ELECTRIC shall not be liable for any delay in performance due to causes
beyond its reasonable control.
The warranty provided herein dues not cover damages, defects, malfunctions, or service interruptions caused by
owner's failire detected to follow the SCHNEIDER ELECTRIC installation, operation, or maintenance instructions;
owner's modification of the product; owner's abuse, misuse, or negligent acts; and power failure detected or surges,
fire, flood, accident, actions of third parties, or other events outside reasonable control.
SAFETY AND HANDLING CAE/EN SA/E20
CAE Documentation Page 13/141
4.2 TRADEMARKS
PACiS is trademark of SCHNEIDER ELECTRIC. Product and company names mentioned herein are trademarks or
trade names of their respective companies.
Any application where a system failure detected would create a risk of harm to property or persons (including the risk
of bodily injuries and death) should not be reliant solely upon one form of electronic system due to the risk of system
failure detected to avoid damage, injury or death, the user or application designer must take reasonably steps to
protect against system failure detected, including -but not limited- to back-up or shut-down mechanisms, not because
end-user system is customized and differs from SCHNEIDER ELECTRIC testing platforms but also a user or
application designer may use SCHNEIDER ELECTRIC products in combination with other products.
These actions cannot be evaluated or contemplated by SCHNEIDER ELECTRIC; Thus, the user or application
designer is ultimately responsible for verifying and validating the suitability of SCHNEIDER ELECTRIC products
whenever they are incorporated in a system or application, even without limitation of the appropriate design, process
and safety levels of such system or application.
INTRODUCTION CAE/EN IT/E20
CAE Documentation Page 14/141
INTRODUCTION (IT)
INTRODUCTION CAE/EN IT/E20
CAE Documentation Page 15/141
CONTENT
1. INTRODUCTION TO USER GUIDE .......................................... 16
1.1 Chapters description ............................................................................................................ 16
1.1.1 Chapter Safety (SA) ................................................................................................................................. 16
1.1.2 Chapter Introduction (IT) ........................................................................................................................... 16
1.1.3 Chapter Installation (IN) ............................................................................................................................ 16
1.1.4 Chapter User Interface (HI) ...................................................................................................................... 16
1.1.5 Chapter Cybersecurity (CS)...................................................................................................................... 16
1.1.6 Chapter Troobleshooting (TG) .................................................................................................................. 16
1.1.7 Chapter Glossary (LX) .............................................................................................................................. 16
1.2 Global Guide ......................................................................................................................... 16
2. INTRODUCTION 17
2.1 CAE Application ................................................................................................................... 17
2.2 CAE Scope ............................................................................................................................ 18
INTRODUCTION CAE/EN IT/E20
CAE Documentation Page 16/141
2. INTRODUCTION
INFORMATION PROTECTION
• For information protection, CAE encrypts communications with devices by the TLS
technology (Transport Layer Security protocol).
• However, encryption of the information is not the main function of CAE software; CAE
uses the encryption information only to protect the information in transit.
NOTE: Please consult the section Encryption on the chapter Cybersecurity (CS) for more
details
INSTALLATION (IN)
INSTALLATION CAE/EN IN/E20
CAE Documentation Page 21/141
CONTENT
1. INTRODUCTION 22
1.1 Prerequisites......................................................................................................................... 22
1.2 License .................................................................................................................................. 22
1.2.1 Scope of Use ............................................................................................................................................ 22
1.2.2 The Licensee agrees NOT TO.................................................................................................................. 22
1.2.3 Duration .................................................................................................................................................... 23
1.2.4 Confidentiality ........................................................................................................................................... 23
1.2.5 The Licensee SHALL NOT ....................................................................................................................... 23
1.2.6 The Licensee SHALL ................................................................................................................................ 23
1.2.7 Warranty ................................................................................................................................................... 23
1.2.8 Limitations of Liability ................................................................................................................................ 23
1.2.9 General ..................................................................................................................................................... 24
1. INTRODUCTION
This document is a chapter of the CAE documentation. It describes the procedure for a complete installation for CAE.
1.1 PREREQUISITES
The CAE software is compliant with following Operating Systems
Topic Description
• Windows® 7 Professional version 32/64 bits Service Pack 1.
Operating System
Supported • Windows® Server 2008 R2 version 64 bits
• Windows® 8
• Windows® 10 Professional version 32/64 bits.
Note: Windows® XP is not supported
1.2 LICENSE
Software License Agreement
All programs and textual works issued by Schneider Electric (hereinafter referred to as ‘The Supplier’) are protected
by copyright. They are supplied on the condition that the Licensee of copies of such programs and text, agrees to
the Terms and Conditions of this License Agreement. The Licensee (which expression includes a purchaser or a
receiver of the Supplier's software on loan) may be held legally liable for any use of the program(s), texts or
documentation which is not in accordance with this License Agreement, in certain circumstances this may involve
criminal prosecution.
The Supplier in consideration of a license fee paid on its own or as part of a purchase price and the Licensee's
agreement to the Terms and Conditions of their License Agreement, agrees to grant, and the Licensee agrees to
accept, a personal, non-exclusive, non-transferable license to use the Supplier's computer program(s), text and
associated documentation, all hereinafter referred to as the ‘Licensed Program’ under the following Terms and
1.2.3 DURATION
This License Agreement becomes effective from the date of the acceptance by the Supplier of the order for the
Licensed Program and shall remain in force until terminated by the Licensee. This License Agreement will terminate
without notice if the Licensee fails to observe any of the Terms and Conditions of the License Agreement. In the
event of a termination, the Licensee agrees to delete the Licensed Program from any storage media that are the
property of the Licensee and to return all complete and partial copies of the Licensed Program together with all copies
of text and documentation to the Supplier.
1.2.4 CONFIDENTIALITY
The Licensed Program contains confidential information of the Supplier and all copyright, trademarks and other
intellectual property rights in the Licensed Program are the exclusive property of the Supplier.
1.2.7 WARRANTY
Subject to the exceptions set out in this clause and the limitations upon its liability:
1. The Supplier warrants that the media upon which the Licensed Program is stored will for a period of 90 days
from the date the Supplier accepts an order for a Licensed Program be free from defects in material design and
workmanship and that the Licensed Program will conform to the Supplier's specifications.
2. The Supplier shall remedy any breach of the above warranties by the replacement of the Licensed Program free
of charge.
3. The Supplier shall have no liability to remedy a breach of warranty where such breach arises as a result of:
a. The improper use, operation, or neglect of the Licensed Program, or the computer equipment it is used
on.
b. A modification of the Licensed Program, or its merging in whole or in part with any other software.
c. Any repair, adjustment, alteration or modification of the Licensed Program by any other person than the
Supplier, without the Supplier's prior written consent.
4. Subject to the foregoing, all conditions, warranties, terms and undertakings, express or implied, statutory or
otherwise, in respect of the Licensed Program are hereby excluded.
2. Any act or omission on the part of the Supplier or its employees agents or sub-contractors shall be known as an
‘Event of Default’.
3. The Supplier's liability to the Licensees for death or injury resulting from its own negligence or that of its
employee’s agents or sub-contractors, shall not be limited.
4. Subject to the limits set out below the Supplier shall accept liability to the Licensee in respect of damage to the
tangible property of the Licensee resulting from the negligence of the Company or its employees, agents or sub-
contractors.
5. Subject to the provisions of clause above the Supplier's entire liability in respect of any Event of Default shall be
limited to damages of an amount equal to:
a. The case of an Event of Default falling within clause above the purchase price of the Licensed Program.
b. The case of any other Event of Default the License fee paid in respect of the Licensed Program.
6. Subject to clause above the Supplier shall not be liable to the Licensee in respect of any Event of Default for loss
of profits, goodwill or any type of special indirect or consequential loss (including loss or damage suffered by the
Licensee as a result of an action brought by a third party) even if such loss was reasonably foreseeable or the
Supplier had been advised of the possibility of the Licensee incurring the same.
1.2.9 GENERAL
This License Agreement overrides all prior written and oral communications regarding the Licensed Program with
the Licensee, and sets out the entire agreement between the Supplier and the Licensee. In the event of a dispute
between the Supplier and the Licensee relating to this License Agreement, the Licensee agrees to submit to the
jurisdiction of the French Courts or to the Courts of other legal systems that may from time to time be elected at the
sole discretion of the Supplier. If any provision in this License Agreement is ruled invalid under any law, such provision
shall be deemed modified or omitted only to the extent necessary to render it valid, and the remainder of this License
Agreement shall continue in full force and effect.
INSTALLATION CAE/EN IN/E20
CAE Documentation Page 25/141
2. MINIMUM REQUIREMENTS
In order to install, configure and use the CAE device by operator, the following frameworks and packages are
required:
Device Description
Release package The release package permits the complete installation. It
contains a set of prerequisites and CAE application with
default settings.
The CAE release package is proposed with two setups for
different operating system:
3. INSTALLATION
3.1 PURPOSE
This section describes the procedure for a complete installation for Cybersecurity Admin Expert (CAE) software.
The CAE release contains several packages:
• CAE Application
• Prerequisites for CAE
The CAE release is provided as an InstallShield executable Setup file. The installation program is set through the
installation procedure described on below sections.
__________________________________________________________________________________________
Note
The Prerequisites package contains:
• Schneider Electric License Manager. Application to activate the CAE license.
• Database program:
__________________________________________________________________________________________
INSTALLATION CAE/EN IN/E20
CAE Documentation Page 27/141
3.2 LICENSING
3.2.1 SCHNEIDER ELECTRIC LICENSE MANAGER
Use the Schneider Electric License Manager application to activate the CAE license.
__________________________________________________________________________________________
Notes
By activating a license for a Schneider Electric software product, the licensee declares that the software
product will be used within the boundaries described in the license agreement.
CAE functions are depending of CAE Licensing Model (Standard Edition / Premium Edition):
CAE features are depending of CAE Licensing Model (Standard Edition / Premium Edition):
Standard Premium
CAE Features
Edition Edition
User Account
Password management
Roles Management
Roles management
User locking
Logs
Security banner
Certificates
Authentication configuration
Visualize Logs
Export Logs
INSTALLATION CAE/EN IN/E20
CAE Documentation Page 29/141
Preferences
Languages
__________________________________________________________________________________________
___________________________________________________________________________________________
Note
Software installation is independent of the activation of software product licenses. Operator can even activate
a license for a software product that is not yet installed.
The general activation principle is to send an activation request to Schneider Electric and subsequently to
receive an activation response from Schneider Electric. The data in the activation request provides
information to the Schneider Electric License Server about the licensee, the software product and the local
PC where the license will be activated. The data in the activation response is validated by the Schneider
Electric License Manager to allow operation of the software product within the scope of your license.
Activation Comment
Method
By Web The Schneider Electric License Manager generates the activation request and
transmits the data through an internet connection to the Schneider Electric License
Server. The activation response is automatically received and processed by the
Schneider Electric License Manager.
By Web Portal The Schneider Electric License Manager generates an XML Request File. The
XML Request File needs to be submitted to Schneider Electric through the
Software Licensing Web Portal. In response an XML Response File is provided for
download in the Software Licensing Web Portal. To complete the activation the
XML Response File needs to be loaded in the Schneider Electric License Manager.
INSTALLATION CAE/EN IN/E20
CAE Documentation Page 31/141
Notes:
• This option does not require a direct connection to the Internet.
• Please do not use it through Internet Explorer navigator.
• It is recommended to use the Web Browser Google Chrome for this
activation method “By Web Portal”:
• For details, please consult the Schneider Electric License Manager User
Manual.
By e-mail The Schneider Electric License Manager generates an XML Request File. In
response an XML Response File is provided by e-mail. To complete the activation
the XML Response File needs to be loaded in the Schneider Electric License
Manager.
INSTALLATION CAE/EN IN/E20
CAE Documentation Page 32/141
By Phone The Schneider Electric License Manager generates a Short Code Request. The
Short Code Request is a string of characters and digits which needs to be told to
the operator during a phone call with the Software Registration Center. During the
call a Short Code Response is generated and the string is told to you by the
operator. To complete the activation the Short Code Response needs to be
entered in the Schneider Electric License Manager.
__________________________________________________________________________________________
INSTALLATION CAE/EN IN/E20
CAE Documentation Page 33/141
Step Action
1 Operator must have administrator privileges on system.
CAE software cannot be installed unless operator is logged on with administrator
privileges.
Step Action
1 The complete CAE installation and configuration needs several steps:
• Installation CAE application on machine
• Activate CAE license with Schneider Electric Licence Manager application
• Setting CAE application
Step Action
1 Unzip the CAE installation package zipped file:
Note: The display of this window is depending of prerequisites installed or not on PC. If
the display is absent, please go to step 3 to continue the CAE installation.
4 Click Install
INSTALLATION CAE/EN IN/E20
CAE Documentation Page 35/141
Note: In this example, the setup has installed prerequisites and is installing the
Schneider Electric License Manager application.
7 Read the Software License Agreement, select “I accept the terms in the
Click Next
Click Install
INSTALLATION CAE/EN IN/E20
CAE Documentation Page 38/141
Click Finish
10 A successful installation displays icon License Manager and CAE applications on the
desktop
INSTALLATION CAE/EN IN/E20
CAE Documentation Page 39/141
Step Action
1 Start Schneider Electric License Manager application:
• From the shortcut in the program group: Start > Programs > Schneider Electric >
License Manager
After starting Schneider Electric License Manager the main dialog Box is displayed:
Example Activation ID
Notes
• The method “By Web” is not recommended for Cybersecurity Use Case.
• The Method “By Web Portal” is recommended with latest Browser Google Chrome
version.
• The activation ID is the license number for product.
• The activation methods are By Web (default) or By Phone or By e-mail. To help to choose
in accordance with requirements, please consult the Schneider Electric License Manager
User Manual. To start user manual from:
Step Action
1 If CAE is running, close it.
2 Logon Windows with User Account with Administrator rights
3 From the Start menu, choose Control Panel.
4 Under Programs, click Uninstall a Program.
5 Select the CAE program and click Uninstall.
6 Click Yes to confirm, If necessary, click Allow.
7 Operator will be notified if an application has to be stopped before uninstallation
OPERATING CAE/EN HI/E20
CAE Documentation Page 45/141
OPERATING (HI)
OPERATING CAE/EN HI/E20
CAE Documentation Page 46/141
CONTENT
1. PURPOSE 48
2. PRESENTATION 48
2.1 CAE Presentation ................................................................................................................. 48
2.2 RBAC Presentation .............................................................................................................. 49
8. COMMUNICATION ................................................................... 92
8.1 Start Communication ........................................................................................................... 92
OPERATING CAE/EN HI/E20
CAE Documentation Page 47/141
1. PURPOSE
This chapter is addressed to users of the Cybersecurity Admin Expert (CAE) User Interface. This guide focuses on
the CAE interface and describes its functionalities.
All illustrations and views are examples.
2. PRESENTATION
A key feature of RBAC model is that all access is through roles. A role is essentially a collection of permissions, and
all users receive permissions only through the roles to which they are assigned, or through roles they inherit through
the role hierarchy.
User Permission
Assignement Assignement
Operations
Functional Objects
Users Roles Permissions
Roles are created for various job activities. The permissions to perform certain operations are assigned to specific
roles. Members or staff (or other system users) are assigned particular roles, and through those role assignments
acquire the computer permissions to perform particular computer-system functions. Since users are not assigned
permissions directly, but only acquire them through their role (or roles), management of individual user rights
becomes a matter of simply assigning appropriate roles to the user's account; this simplifies common operations,
such as adding a user, or changing user's account.
RBAC defines four different concepts:
RBAC Standard
Definition Description
Subject A subject is a user of the system. Note that a subject can be a person, or an
automated agent / device.
Right A right is the ability to access an object in order to perform certain operations
(e.g. setting a data or reading a file)
Role A role defines a certain authority level in the system. Rights are assigned to roles.
OPERATING CAE/EN HI/E20
CAE Documentation Page 50/141
2. Role authorization
A subject's active role must be authorized for the subject. With rule 1 above,
this rule helps to ensure that users can take on only roles for which they are
authorized.
3. Permission
A subject can exercise permission only if the permission is authorized for the
authorization
subject's active role. With rules 1 and 2, this rule helps to ensure that users can
exercise only permissions for which they are authorized.
___________________________________________________________________________________________
Note
Please see http://csrc.nist.gov/groups/SNS/rbac/standards.html website for RBAC standards.
___________________________________________________________________________________________
OPERATING CAE/EN HI/E20
CAE Documentation Page 51/141
3. FUNCTIONS OVERVIEW
CAE allows administrator to configure User Accounts, Roles, Permission, Elements to Secure (ETS) and System
Security Parameters without connection with devices. Information is stored on the database. This is the Offline
mode.
CAE allows devices supervision connected on network. This is the online mode.
Here are the main functions:
• General Administration
o Security Parameters & Models
o User Accounts Management
o Users Accounts & Roles association Management
o Security Configuration (user locking, logs, security banner, autentification)
• Advanced Administration
o Roles
o Element to Secure
o Import / Export database
o Certificate
• Administration
o Devices rules
o Edit Device Security Settings
o Import Network File
• Communication
o Refresh IED list
o Display IED Logs
o Display SAM Logs
o Push RBAC and Security Policies
o Export IED Logs
4. EASY TO USE
This section contains recommendations and best pratices to help operator to use CAE.
5. GETTING STARTED
CAUTION
UNEXPECTED EQUIPMENT BEHAVIOR
Please refer to chapter Installation, § License Activation for License activation procedure.
___________________________________________________________________________________________
OPERATING CAE/EN HI/E20
CAE Documentation Page 53/141
Work in CAE's full screen mode. Using full screen mode will hide the
menu bar, tab bar and the tool bar, allowing you to better focus on your
Full Screen
tasks. To turn off full screen mode, click this icon in the top right hand
corner of the screen
Help To get help on CAE. The online user manual displays on screen.
The toolbar is in fixed position and cannot be moved. Depending on the active module and the context, icon buttons
may be disabled (they will be grayed in the toolbar). The top line of the shows the name of the application, the user
name, logout and window size (minimize, restore, maximize and close) buttons).
OPERATING CAE/EN HI/E20
CAE Documentation Page 57/141
The navigation banner (1) contains tabs for presentation views and tab control button .
To open a tab, do the following:
1 2
This feature allows the security administrator to edit the User Parameters for security, including the user locking
(passwords, locking, login) defined for the system.
• Size: 8 characters
IEEEStd1686
minimum.
• Characters allowed:
ASCII[33,122]
• 1 letter lowercase, 1
uppercase,1 digit and 1
non alphanumeric
• Size: 8 characters
NERC
minimum
• Characters allowed:
ASCII[33,122]
• The lesser of three or
more different types of
characters (e.g.,
uppercase alphabetic,
OPERATING CAE/EN HI/E20
CAE Documentation Page 60/141
lowercase alphabetic,
numeric,
nonalphanumeric)
Number of previous passwords The number of last previous passwords that 3 by default
which cannot be reused cannot be reused.
Allow user locking Check/unckeck allows user account locking Checked by default
Maximum login attempts The Maximum login attempts 5 by default
Password attempts timer (min) The Password attempts timer (minutes) 3 by default
Automatic user account unlocking Check/unckeck Automatic user account Checked by default
unlocking
Locking period duration (s) The Locking period duration (seconds) 240 by default
Default role for centralized authentication The role assigned by default when the VIEWER by
Application uses the centralized access and default
that the role is not given.
This is the complete list of available roles:
• ENGINEER
• INSTALLER
• OPERATOR
• RBACMNT
• SECADM
• SECAUD
• VIEWER
Centralized autentification timeout (s) The maximum time that the Security 5 by default
Application waiting for an authentication
answer from each server.
Centralized authentication protocol The Centralized authentication protocol None by
selected: default
• None (see Note 1)
• RADIUS (see Note 2)
Note 1: if none centralized authentication
protocol is selected, then no centralized
authentication parameters will be included in
the Security Policies.
Note 2: If the centralized authentication
protocol RADIUS is selected, then the
administrator shall fill up the RADIUS client
configuration.
OPERATING CAE/EN HI/E20
CAE Documentation Page 68/141
To import and export the database please refer to section Import / Export database for operations.
OPERATING CAE/EN HI/E20
CAE Documentation Page 71/141
Export feature allows making backups of the whole data of CAE, including password. Then, after
the backup importation, the customer has to know his password active at the date of the backup
Note: Do not follow this instruction will result a not established access with CAE.
Category Presentation
User Information Includes editable fields:
• User name (mandatory)
• Phone number
• Email
• Work details
Contains fixed fields:
• The creation date of the current account
• The last modification date of the current account
• Sort by Login
• Sort by First Name
• Sort by Last Name
• Sort by Phone Number
• Sort by Email
• Sort by Works details
• Sort by Deactivated
• Sort Creation (user account)
• Sort Last Modification (user account)
Some parameters are mandatory and others are optional. Mandatory user account parameters are:
• First Name
• Last Name
• Login
OPERATING CAE/EN HI/E20
CAE Documentation Page 75/141
1 2 1 2
__________________________________________________________________________________________
Note
To configure the Local Default Access for Default Scope, do the following:
• Right button
• Select Edit (1)
• Check Local Default Access option (2)
• Choose Roles associated to local default access on list (3)
• Click Apply button
To show the history for Access for Default Scope versioning, do the following:
• Right button
• Select Show History
• The View of Histories is displayed:
1 2
When a new user account is created, it must be associated to role(s). This operation is configured by security
administrator by two steps:
_______________________________________________________________________________
OPERATING CAE/EN HI/E20
CAE Documentation Page 82/141
• Left panel. This is the System structure tree view containing the Substation node and the AOR node. From
here the user can Import/Export system structure and rename System, Substation or AOR names.
Note: Up to date, this structure is fixed and no other nodes can be added.
• Right panel. All the devices declared within the system structure will be displayed in this area. The user can
add devices, import, delete or edit them.
• From Substation, click Add SAM button on the bottom right corner of the window to add the SAM
connected to the system:
Note: Only one SAM device can be defined.
• This window will appear. Fill in the required information and click OK:
• Now the SAM has been declared as a device within the system structure:
• Once SAM has been added, go to AOR node and click Add Device button to add a device.
To go faster, the user can use Import devices from a CSV file button to add all or several devices at a
time. To do so, create a CSV file containing the devices and import it.
Note: This action will not remove or replace any other device already added.
• This window will appear: Fill in the required information and click OK:
• Devices added will show as follows and by right clicking on them the user can Delete (also by clicking the
Trash icon) or Edit them:
Each row in the file defines a device.The following information, separated by one of the allowed delimiter, has to be
provided per device:
Once all the devices in the system have been declared, use Network Device List→Refresh option to do the
discovery of the complete system. See how in section 8.2 Refresh IEDs List.
This is an example of a valid xml file:
7.4.4 RENAME
System, Substation and AOR menu names are customizable. Use Rename function in order to name these
menus according to your project needs:
• Select the menu/node to be renamed, right click on it and select Rename function:
• Now in our example, the name of the substation has been changed:
OPERATING CAE/EN HI/E20
CAE Documentation Page 91/141
7.5 PREFERENCES
7.5.1 LANGUAGE
In the Preferences view the Security Administrator can choose the language of CAE user Interface.
The available languages are:
• Apply button :
OPERATING CAE/EN HI/E20
CAE Documentation Page 92/141
8. COMMUNICATION
___________________________________________________________________________________________
Note
The communication needs operational network and devices. In case of SAM is not detected in network, there
is none information displayed to operator.
___________________________________________________________________________________________
OPERATING CAE/EN HI/E20
CAE Documentation Page 93/141
• Click Add Key button to assign a security key to the current device template.
OPERATING CAE/EN HI/E20
CAE Documentation Page 98/141
• Click Apply
• click OK
• Click Edit Device templates in the Network Device List view. The list of device templates appears in a
tab. Each record can be edited or deleted.
• Select the desired raw and click the delete icon
A new Device templates (<device type> <firmware>) tab appears on screen. It shows the selected device model
type, its firmware version (not editable) and a grid containing the security keys that have been assigned to the
current device template.
• In the Key Editor window that appears on screen, change the name of the key, its type and its default
value:
OPERATING CAE/EN HI/E20
CAE Documentation Page 100/141
Note that the Type field is for information only. There is no control of consistency between the type and the value.
• Click Apply to save these parameters
• Click OK to exit the Key Editor window.
In the Device template (<device type> <firmware>), click Add key button at the bottom of the tab.
OPERATING CAE/EN HI/E20
CAE Documentation Page 101/141
• In the Key Editor window that appears on screen, enter a name for the key, select a type and enter a
default value:
Note that the Type field is for information only. There is no control of consistency between the type and the value.
• Click Apply to save these changes,
• Click OK to exit the Key Editor window
A popup window appears on screen for you to confirm the key deletion:
___________________________________________________________________________________________
Note
The case of none Security Logs is informed by Information Window
___________________________________________________________________________________________
OPERATING CAE/EN HI/E20
CAE Documentation Page 103/141
The Logs SAM view contains 2 parts (see previous Figure above):
• The Tool bar (1)
• The List of Logs (2)
The Tool bar allows to:
Refresh button
• Export the list to document file
Standard format proposed:
CSV (default), XML and HTML
Export Logs button
• Search log(s) by key word
Search function
OPERATING CAE/EN HI/E20
CAE Documentation Page 104/141
Field Description
DateTime Date and hour of Log
Date format: Day/Mouth/Year
Hour format: Hour: Minute: Second
LogId Identify number of Log
Level Level of Log
Note: The security logs model is available on APPENDIX
section
Type Security logs category in standard.
Please refer to section APPENDIX on section Security Logs
AppName Application name source of log
AppMsg Application cause of log
IssuerId Name device source of log
IssuerAddr IP address device source of log
PeerId Login of user source of log
PeerAddr IP address client source of log
Logs Properties
___________________________________________________________________________________________
Notes
Logs are only available if SAM is detected by Network Device List.
In the logs panel, to display a large content, please double-click on the splitter.
The case of none Security Logs is informed by Information Window.
___________________________________________________________________________________________
OPERATING CAE/EN HI/E20
CAE Documentation Page 105/141
Action Result
• Select on Network Device List
tab
• Click on Refresh button
The list of devices connected is refreshed:
• Click on OK button
The Window “Push RBAC status summary” is displayed
when the pushing configuration is finished:
___________________________________________________________________________________________
Notes
The first RBAC pushing operation to the device, with factory settings, has to be executed with SECADM role.
The Configuration Version Name identifies which configuration has been pushed.
The successful Push RBAC operation involves the increment of quadruplet (Users Version, Roles
Version, Permission Version, Security Policies Version). Each version of quadruplet is incremented + 1
(VXX.YY) from the device highest version detected.
___________________________________________________________________________________________
Please refer to Chapter TG on section 2.3 Push Configuration Issue to find exception use cases after a
Push configuration
OPERATING CAE/EN HI/E20
CAE Documentation Page 107/141
Role Description
Can View what objects are present within a Logical-Device by presenting the type ID of
VIEWER
those objects.
An Operator can view what objects and values are present within a Logical-Device by
OPERATOR
presenting the type ID of those objects as well as perform control actions.
An Engineer can view what objects and values are present within a Logical-Device by
ENGINEER presenting the type ID of those objects. Moreover, an engineer has full access to Datasets
and Files and can configure the server locally or remotely.
An Installer can view what objects and values are present within a Logical-Device by
INSTALLER presenting the type ID of those objects. Moreover, an installer can write files and can
configure the server locally or remotely.
Security Administrator can change subject-to-role assignments (outside the device) and
SECADM role-to-permission assignment (inside the device) and validity periods; change security
setting such as certificates for subject authentication and access token verification.
SECAUD Security Auditor can view audit logs.
RBACMNT RBAC Management can change role-to-permission assignment.
Default User Roles Summary
OPERATING CAE/EN HI/E20
CAE Documentation Page 109/141
• Sort by Role
• Sort by Description
• Sort by Associated ETS
• Sort by Creation
• Sort by Last Modification
Create Role is applied by clicking Add new Role button. Several parameters categories are proposed with default
values; some parameters are mandatory and others are optional.
Mandatory Role parameter is:
• Role Name
An Element To Secure (ETS) is an entity that represents a tool, a utility or an application function block that can
be protected within the System. It gathers a list of corresponding permissions with their set of values. This list is
pre-defined and cannot be edited by any business user.
A same ETS can be associated to many roles with different set of authorizations.
___________________________________________________________________________________________
Note
ETS management is an advanced administration feature. The ETS management customization will be
described in future document version.
___________________________________________________________________________________________
These constraints are device specificities and are stored in the CAE.Constraints.xml file:
For more details, please refer to Push Configuration Issue where Use Case #3 contains an example
to create of a subset of user account.
___________________________________________________________________________________________
OPERATING CAE/EN HI/E20
CAE Documentation Page 118/141
Export feature allows making backups of the whole data of CAE, including password. Then, after
the backup importation, the customer has to know his password active at the date of the backup
Note: Do not follow this instruction will result a not established access with CAE.
• Click on Import button from CAE toolbar or open the Security Configuration Editor tab and choose
10. APPENDIX
10.1 SECURITY LOGS CATEGORY LIST
Security logs emissions depend on well-known security standards. The next table presents the list of security logs
category available for each standard:
CS Phase 2
CS Phase I
NERC CIP
IEEE 1686
IEC62351
BDEW
E3
Log ID SEVERITY EXPLANATION
CS Phase 2
CS Phase I
NERC CIP
IEEE 1686
IEC62351
BDEW
E3
Log ID SEVERITY EXPLANATION
CYBERSECURITY (CS)
CYBERSECURITY CAE/EN CS/E20
CAE Documentation Page 123/141
CONTENT
1. SCOPE OF THE DOCUMENT ................................................ 124
2. DOCUMENTATION REFERENCE ......................................... 124
3. CYBERSECURITY POLICY ................................................... 124
3.1 Encryption........................................................................................................................... 124
3.2 Password ............................................................................................................................ 124
3.2.1 Privileges and Default password ............................................................................................................ 124
3.2.2 Security Policy ........................................................................................................................................ 125
3.3 Security logs ....................................................................................................................... 125
3.4 Antivirus .............................................................................................................................. 125
3.5 Hardening............................................................................................................................ 126
CYBERSECURITY CAE/EN CS/E20
CAE Documentation Page 124/141
2. DOCUMENTATION REFERENCE
Document Title
3. CYBERSECURITY POLICY
3.1 ENCRYPTION
This product contains a cybersecurity function, which manages the encryption of the data exchanged through some
of the communication channels. The aim is to protect the data (configuration and process data) from any corruption,
malice, attack. Subsequently, this product might be subject to control from customs authorities, and it might be
necessary to request special authorization from these customs authorities before any export/import operation. For
any technical question relating to the characteristics of this encryption please contact your Customer Care Centre -
www.schneider-electric.com/CCC.
3.2 PASSWORD
A password is required to place a command or set a parameter (whether from the front panel or via a PC-based
application). For this purpose, at some point, the user chooses a profile that depends on the intended activity.
Access without a proper password is denied as soon as the security administrator has defined the passwords.
___________________________________________________________________________________________
Note
Please refer to chapter HI for password configuration.
___________________________________________________________________________________________
3.4 ANTIVIRUS
The Windows-based PCs are vulnerable to viruses.
The PCs hosting NON time-critical application CAE can be permanently scanned.
___________________________________________________________________________________________
CYBERSECURITY CAE/EN CS/E20
CAE Documentation Page 126/141
Note
For PC guard with antivirus solution, please refer to the documentation “PACiS System Cybersecurity
(SCS) User Guide” on section Hardening PC based solution.
___________________________________________________________________________________________
3.5 HARDENING
The CAE hardening involves installation operations for:
• Hardening Operating System Windows (7 / 2008 R2 Server / 10)
• Hardening Server 2008 R2 SP2 Enterprise Edition
The Hardening is depending on Customer Security Policy. For securing database program, apply hardening rules
(Customer Security Policy).
___________________________________________________________________________________________
Note
For CAE integrated on PACiS offer, please refer to the documentation “PACiS HARDENING Application
Note” on section Installation to follow hardening procedures for CAE and the documentation “PACiS System
Cybersecurity (SCS) User Guide” on section Device Hardening for overview.
TROUBLESHOOTING CAE/EN TG/E20
CAE Documentation Page 127/141
TROUBLESHOOTING (TG)
TROUBLESHOOTING CAE/EN TG/E20
CAE Documentation Page 128/141
CONTENT
1. INTRODUCTION 129
2. ISSUES 129
2.1 Installation Issues .............................................................................................................. 129
2.2 Operating System Network Configuration Issue .............................................................. 129
2.3 Push Configuration Issue .................................................................................................. 131
2.4 Communication Issue ........................................................................................................ 135
TROUBLESHOOTING CAE/EN TG/E20
CAE Documentation Page 129/141
1. INTRODUCTION
This document is a chapter of the Cybersecurity Admin Expert (CAE) manual. It helps troubleshoot most common
technical facts that might arise on CAE software.
2. ISSUES
Recommendation To avoid communication troubles between CAE and devices, we recommend the link
between CAE application and devices through a point to point ethernet connection.
TROUBLESHOOTING CAE/EN TG/E20
CAE Documentation Page 131/141
• CAE does not allow to send the configuration and the device has not been
configured.
Possible cause A type of device is not included on the list of Element To Secure
• Add the corresponding the new ETS type inside the list of Element To
Possible resolution
Secure.
TROUBLESHOOTING CAE/EN TG/E20
CAE Documentation Page 133/141
Use case #3 User password length is out of limit for a device type
• Click Send to All button in the Network Device List;
Observation
• The Alert message is displayed:
• CAE does not allow to send the configuration and the device has not been
configured.
Note: The maximum length constraint for password depends of type of device.
Please consult the table on §Devices Rules for details.
For example: the “John Smith” user Password length is 20. The RBAC configuration
is sent to 2 types of device (C264 and EcoSUI):
The devices rules modification procedure below is described from the previous
example “John Smith”:
Action Result
• Select on
Security
Administration
TROUBLESHOOTING CAE/EN TG/E20
CAE Documentation Page 134/141
> Devices
Rules tab
• Select device
type with
password length
less than 20
(Type: C264)
• Select the user
(John Smith)
• Save button
• OK button and
The RBAC files have been sent to devices.
push the
configuration
operation
TROUBLESHOOTING CAE/EN TG/E20
CAE Documentation Page 135/141
GLOSSARY (LX)
GLOSSARY CAE/EN LX/E20
CAE Documentation Page 137/141
NAME DESCRIPTION
Security Policies System security policies are security settings that are applied throughout the entire
secured system. These policies generally refer to the use of standards but not only.
They are used to define any security related configuration shared between all the
devices. Some example of security policies: Log security events as requested by
BDEW standard; Use NERC passwords
SNMP Simple Network Management Protocol (SNMP) is an "Internet-standard protocol
for managing devices on IP networks.
Syslog Protocol defining system logs events service and how to exchange these logs.
System The document refers to word “System”. The “System” is also called “Digital Control
System for Substation Automation”.
TAT Transfer Administration Tool
TLS Transport Layer Security protocol
UA User Account.
A user account is a logical representation of a person with some configurable
parameters. It includes information about the user identity and gives him a login to
be recognized within the tool suite.
A user account is principally interesting when it is associated to some roles that will
grant him authorizations.
UDP User Datagram Protocol
User User accounts for individual or groups to restrict access to the runtime system.
Login user names and passwords need to be set up.
Customer Care Centre
http://www.schneider-electric.com/CCC
Schneider Electric
35 rue Joseph Monier
92506 Rueil-Malmaison
FRANCE
Phone: +33 (0) 1 41 29 70 00
Fax: +33 (0) 1 41 29 71 00
www.schneider-electric.com Publishing: Schneider Electric
Publication: CAE/EN UG/E20 07/2018