Security configuration summary
- Last UpdatedDec 28, 2022
- 1 minute read
The following table summarizes the ports that each application listens to for incoming connections. To access these ports from remote clients, firewalls between the application host and remote client must permit incoming connections to the application port.
|
Application |
Connection |
Port number |
Client Authentication |
Purpose |
Comment |
|---|---|---|---|---|---|
|
PI Connector |
HTTPS |
Configurable |
HTTP Basic |
Web-based user interface |
Must be a member of local PI Connector Administrators group. |
|
PI Connector Relay |
HTTPS |
Configurable |
HTTP Basic |
Registration |
Relay registration is initiated from PI Data Collection Manager. |
|
Token |
OMF application data ingress |
Data is sent from the OMF application to the relay. |
|||
|
AMQPS |
5671 |
X.509 certificate |
Data collection |
Data is sent from the connector to the relay. |
|
|
PI Data Collection Manager |
HTTPS |
Configurable |
HTTP Basic |
Web-based user interface and registration |
Must be a member of local PI Connector Administrators group or PI Trusted Installers group for connector registration. |
|
AMQPS |
5672 |
X.509 certificate |
Administration |
Connectors and relays initiate connections to PI Data Collection Manager |