Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Adapter for BACnet

Security

  • Last UpdatedFeb 04, 2025
  • 1 minute read

When determining adapter security practices, consider the following:

  • To keep the adapter secure, only administrators should have access to machines where the adapter is installed.

  • REST APIs are bound to localhost, meaning only requests coming from within the machine will be accepted.

  • Depending on the data endpoint you decide to use and your company's security policies, you will have the option to choose from several authentication methods. For details, refer to Configure data endpoints.

TitleResults for “How to create a CRG?”Also Available in