Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

PI Connector for Wonderware Historian

Release notes

  • Last UpdatedOct 20, 2023
  • 3 minute read

PI Connector for Wonderware Historian

1.6.9.14

Overview

In this version of the connector, historical data is retrieved more efficiently from the Wonderware Historian server. A new feature has been added that will allow users to explicitly choose which Wonderware tags will have a quality value collected. Additionally, the connector can now authenticate against the Wonderware SQL server via Windows Authentication. Finally, the connector now supports Wonderware Historian 2020 R2.

Fixes and Enhancements

Fixes

This section lists items that were fixed in this release of PI Connector for Wonderware Historian:

Work Items

Description

239407

The connector now supports Wonderware Historian 2020 R2.

Enhancements

This section lists items that were added in this release of PI Connector for Wonderware Historian:

Work Items

Description

149241

Previously, if a user wanted to collect quality data, then they would have to collect quality attributes for all Wonderware items or not collect it at all. The connector now supports the use of regular expression filtering to select which Wonderware attributes they would like to collect quality data for. This feature functions similarly to the existing tag selection process.

172544

The connector now supports authenticating with the Wonderware SQL server via Windows Authentication.

Known Issues

There are no known issues for this release.

System Requirements

Operating Systems

This release supports the following operating systems:

  • Windows Server 2019

  • Windows Server 2016

  • Windows Server 2012 R2

  • Windows 10

Distribution Kit Files

Product

Software Version

Microsoft .NET Framework 4.8 Setup

4.8

Microsoft Visual C++ 2019 Redistributable (x86)

14.22.27821.0

Microsoft Visual C++ 2019 Redistributable (x64)

14.22.27821.0

PI AF Client 2018 SP3 Patch 3

2.10.9.593

PI Connector for Wonderware Historian

1.6.9.14

Installation and Upgrade

Installing PI Connector for Wonderware Historian

Refer to Install the connector in the user guide. The user guide is located in the PI Connectors section of the Doc Library.

Uninstalling PI Connector for Wonderware Historian

Refer to Uninstall the connector in the user guide.

Security information and guidance

We are committed to releasing secure products. This section is intended to provide relevant security-related information to guide your installation or upgrade decision.

We proactively disclose aggregate information about the number and severity of security vulnerabilities addressed in each release. The tables below provide an overview of security issues addressed and their relative severity based on standard scoring.

No additional security vulnerabilities are applicable to this release.

Overview of New Vulnerabilities Found or Fixed

For this release of the PI Connector for Wonderware Historian, two vulnerabilities have been identified and fixed. Based on the CVSS scoring system both vulnerabilities have been categorized as a Medium (5.0 - 6.9). One vulnerability has been resolved in the PI Connector for Wonderware Historian. The second vulnerability has been resolved in the jQuery subcomponent which is included in this PI Connector for Wonderware Historian. To reduce exposure to these security issues, upgrade to the latest release.

Subcomponents of this release contain known vulnerabilities which are not exploitable in PI Connector for Wonderware Historian.

This table lists the known vulnerabilities along with their mitigation in this product.

Component

Version

CVE or Reference

CVSS

Mitigation

json.NET

6.0.8

https://alephsecurity.com/vulns/aleph-2018004

6.8

The MaxDepth Json serialization parameter is used to protect against the DoS vulnerability.

Bouncy Castle

1.8.1

CVE-2020-15522

5.9

This vulnerability does not apply to PI Connectors because they do not use ECDSA Encryption.

In This Topic
TitleResults for “How to create a CRG?”Also Available in