{"id":369,"date":"2019-03-25T17:30:31","date_gmt":"2019-03-25T20:30:31","guid":{"rendered":"http:\/\/xexeu.elipse.com.br\/pt\/protecting-projects\/"},"modified":"2020-09-08T09:57:35","modified_gmt":"2020-09-08T12:57:35","slug":"how-to-protect-elipse-e3-projects-edition-and-execution","status":"publish","type":"post","link":"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/","title":{"rendered":"Protecting projects."},"content":{"rendered":"<div style=\"text-align: justify;\">\n<p>This article shows how to protect Elipse E3 projects: at the <strong>edition<\/strong> stage and at the <strong>execution <\/strong>stage.<\/p>\n<h2><span style=\"font-weight: bold;\">1) Introduction<\/span><\/h2>\n<p>Using <a href=\"https:\/\/kb.elipse.com.br\/en\/category\/english\/elipse-e3-en\/xcontrol-xobject-lib-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">libraries<\/a> with <a href=\"https:\/\/www.elipse.com.br\/en\/produto\/elipse-e3\/\" target=\"_blank\" rel=\"noopener noreferrer\">Elipse E3<\/a> presents countless advantages when compared to developing projects that do not use this resource. Creating these &#8220;software modules&#8221; is highly recommended, since many of its features (such as timing tests, for example) can be more easily handled with this technology. After a library has been developed, it is quickly adopted as a pattern for projects where the focus is covered by this library. For example, for sub-station controls, there is a set of data and control objects that implement different entities from the power industry (such as circuit breakers, transformers, etc.) that enable the rapid development of this type of application. Other libraries can cover different areas.<\/p>\n<p>To keep a specific library or project from being edited by accident, or specific developer&#8217;s procedures from being copied, E3 provides control over the <span style=\"font-weight: bold;\">edition <\/span>of these files, whether they are projects or libraries.<\/p>\n<p>In addition, there is another type of protection implemented in E3: protection from <span style=\"font-weight: bold;\">execution<\/span>. In order to run a specific project, the hardkey must have a permission to execute it. This protects the developer from non-authorized copies of the project, for example. To show you how to use these functionalities, this article will present the steps required for creating both types of protection: Studio protection, and Execution protection.<\/p>\n<h2><br style=\"font-weight: bold;\" \/><span style=\"font-weight: bold;\">2) Procedures<\/span><\/h2>\n<p>To implement protection for projects or libraries in E3 via <span style=\"font-weight: bold;\">E3Studio<\/span>, access the <span style=\"font-weight: bold;\">Organizer <\/span>and go to <span style=\"font-weight: bold;\">Settings&#8211;Files<\/span>. Right-click the file (project or library), and then select the option <span style=\"font-weight: bold;\">Protection <\/span>(Fig. 1).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID108\/Figura1.png\" alt=\"\" width=\"294\" height=\"435\" align=\"Baseline\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 1 <\/span>&#8211; Protection option <\/span><\/div>\n<p>The protection setup screen (Fig. 2) will then open. Please notice that these protections are enabled incrementally; that is, the execution protection can only be enabled after the edition protection has been implemented.<\/p>\n<p><span style=\"font-weight: bold;\">WARNING!<\/span> You can&#8217;t undo any of these protections if you misplace the password! Therefore, when protecting a specific file, keep its passwords stored safely. Otherwise, you will not be able to use this file anymore.<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID108\/Figura2.png\" alt=\"\" width=\"370\" height=\"553\" align=\"Baseline\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 2<\/span> &#8211; Studio Protection<\/span><\/div>\n<p>The edition password can be setup via <span style=\"font-weight: bold;\">Add Protection<\/span> button, in <span style=\"font-weight: bold;\">Studio Protection<\/span>.\u00a0 You can implement this protection to:<\/p>\n<ul>\n<li>Keep non-qualified personnel from editing the file.<\/li>\n<li>Keep specific technology from unwanted copying or edition.<\/li>\n<li>Maintain greater control over the files used in a specific project.<\/li>\n<li>Disallow changes in a project, even when the client has an E3 Studio copy.<\/li>\n<\/ul>\n<p>The execution protection (Fig. 3) can only be enabled after the edition protection has been implemented (Fig. 2). The execution protection depends on a password saved in the hardkey setup with E3 Server. For this, it is necessary to save the password in the hardkey, which can only be done by Elipse Software. To do so, when ordering the E3 Server copy, you must supply the execution password. However, this process can be done after the server has been purchased.<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID108\/Figura3.png\" alt=\"\" width=\"370\" height=\"553\" align=\"Baseline\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 3<\/span> &#8211; Execution Protection<\/span><\/div>\n<h2><span style=\"font-weight: bold;\"><br \/>\n3) Final Remarks<\/span><\/h2>\n<p>In short:<\/p>\n<ul>\n<li>You can use the protections available in Elipse E3 for either project or library files.<\/li>\n<li>You can&#8217;t remove passwords registered in the files without it, so you will have to provide the password in order to be able to retrieve it. Be careful with your protection passwords.<\/li>\n<li>Execution protection depends on providing the password to Elipse Software. Without this password, it is not possible to execute a protected project.<\/li>\n<li>If you can&#8217;t register the execution password at the time of purchase, you still will be able to do it later. However, the most efficient process is to register the password at the time of purchase.<\/li>\n<li>Whenever possible, protect the files and register its password later in the process, during installation. This facilitates edition, and creates a back-up unprotected copy in case of a misplaced password.<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This article shows how to protect Elipse E3 projects: at the edition stage and at the execution stage. 1) Introduction Using libraries with Elipse E3 presents countless advantages when compared&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0},"categories":[757],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to protect Elipse E3 projects: edition and execution.<\/title>\n<meta name=\"description\" content=\"This article shows how to protect Elipse E3 projects. There are two stages where measures to protect the projects can be taken: at edition and at execution.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect Elipse E3 projects: edition and execution.\" \/>\n<meta property=\"og:description\" content=\"This article shows how to protect Elipse E3 projects. There are two stages where measures to protect the projects can be taken: at edition and at execution.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/\" \/>\n<meta property=\"og:site_name\" content=\"Elipse Knowledgebase\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/elipsesoftware\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-25T20:30:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-08T12:57:35+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID108\/Figura1.png\" \/>\n<meta name=\"author\" content=\"Elipse Software\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Elipse Software\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/\"},\"author\":{\"name\":\"Elipse Software\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/def69ea453ea60b250497b89225a9f87\"},\"headline\":\"Protecting projects.\",\"datePublished\":\"2019-03-25T20:30:31+00:00\",\"dateModified\":\"2020-09-08T12:57:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/\"},\"wordCount\":1216,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\"},\"articleSection\":[\"Other\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/\",\"url\":\"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/\",\"name\":\"How to protect Elipse E3 projects: edition and execution.\",\"isPartOf\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#website\"},\"datePublished\":\"2019-03-25T20:30:31+00:00\",\"dateModified\":\"2020-09-08T12:57:35+00:00\",\"description\":\"This article shows how to protect Elipse E3 projects. There are two stages where measures to protect the projects can be taken: at edition and at execution.\",\"breadcrumb\":{\"@id\":\"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/kb.elipse.com.br\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting projects.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kb.elipse.com.br\/#website\",\"url\":\"https:\/\/kb.elipse.com.br\/\",\"name\":\"Elipse Knowledgebase\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kb.elipse.com.br\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\",\"name\":\"Elipse Software\",\"url\":\"https:\/\/kb.elipse.com.br\/\",\"sameAs\":[\"http:\/\/www.facebook.com\/elipsesoftware\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png\",\"contentUrl\":\"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png\",\"width\":161,\"height\":58,\"caption\":\"Elipse Software\"},\"image\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/def69ea453ea60b250497b89225a9f87\",\"name\":\"Elipse Software\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ff1f7ec38f4687b06f6851d97b3cd2d0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ff1f7ec38f4687b06f6851d97b3cd2d0?s=96&d=mm&r=g\",\"caption\":\"Elipse Software\"},\"url\":\"https:\/\/kb.elipse.com.br\/en\/author\/webmasterelipse-com-br\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to protect Elipse E3 projects: edition and execution.","description":"This article shows how to protect Elipse E3 projects. There are two stages where measures to protect the projects can be taken: at edition and at execution.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/","og_locale":"en_US","og_type":"article","og_title":"How to protect Elipse E3 projects: edition and execution.","og_description":"This article shows how to protect Elipse E3 projects. There are two stages where measures to protect the projects can be taken: at edition and at execution.","og_url":"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/","og_site_name":"Elipse Knowledgebase","article_publisher":"http:\/\/www.facebook.com\/elipsesoftware","article_published_time":"2019-03-25T20:30:31+00:00","article_modified_time":"2020-09-08T12:57:35+00:00","og_image":[{"url":"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID108\/Figura1.png"}],"author":"Elipse Software","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Elipse Software","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/#article","isPartOf":{"@id":"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/"},"author":{"name":"Elipse Software","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/def69ea453ea60b250497b89225a9f87"},"headline":"Protecting projects.","datePublished":"2019-03-25T20:30:31+00:00","dateModified":"2020-09-08T12:57:35+00:00","mainEntityOfPage":{"@id":"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/"},"wordCount":1216,"commentCount":0,"publisher":{"@id":"https:\/\/kb.elipse.com.br\/#organization"},"articleSection":["Other"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/","url":"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/","name":"How to protect Elipse E3 projects: edition and execution.","isPartOf":{"@id":"https:\/\/kb.elipse.com.br\/#website"},"datePublished":"2019-03-25T20:30:31+00:00","dateModified":"2020-09-08T12:57:35+00:00","description":"This article shows how to protect Elipse E3 projects. There are two stages where measures to protect the projects can be taken: at edition and at execution.","breadcrumb":{"@id":"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kb.elipse.com.br\/en\/how-to-protect-elipse-e3-projects-edition-and-execution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/kb.elipse.com.br\/en\/"},{"@type":"ListItem","position":2,"name":"Protecting projects."}]},{"@type":"WebSite","@id":"https:\/\/kb.elipse.com.br\/#website","url":"https:\/\/kb.elipse.com.br\/","name":"Elipse Knowledgebase","description":"","publisher":{"@id":"https:\/\/kb.elipse.com.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kb.elipse.com.br\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kb.elipse.com.br\/#organization","name":"Elipse Software","url":"https:\/\/kb.elipse.com.br\/","sameAs":["http:\/\/www.facebook.com\/elipsesoftware"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/","url":"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png","contentUrl":"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png","width":161,"height":58,"caption":"Elipse Software"},"image":{"@id":"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/def69ea453ea60b250497b89225a9f87","name":"Elipse Software","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ff1f7ec38f4687b06f6851d97b3cd2d0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ff1f7ec38f4687b06f6851d97b3cd2d0?s=96&d=mm&r=g","caption":"Elipse Software"},"url":"https:\/\/kb.elipse.com.br\/en\/author\/webmasterelipse-com-br\/"}]}},"_links":{"self":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/369"}],"collection":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/comments?post=369"}],"version-history":[{"count":4,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/369\/revisions"}],"predecessor-version":[{"id":11510,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/369\/revisions\/11510"}],"wp:attachment":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/media?parent=369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/categories?post=369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/tags?post=369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}