Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

PI Integrator for Business Analytics

PI Integrator Framework Security

  • Last UpdatedJun 25, 2025
  • 1 minute read

There are three general areas to consider when planning security for PI Integrator for Business Analytics:

  • Application security – Defines best practices to secure the PI Integrator for Business Analytics services, such as defensive measures against Denial of Service (DoS) attacks.

  • Data security — Determines which users are granted access to data in PI AF and how that security is managed.

    Note: The security of the published data that resides on the designated target needs to be considered. Published data security is handled and managed within the publish target itself. For more information on managing access to target data, see Secure views for an identity.

  • User Access security — Defines which users are granted access to the PI Integrator for Business Analytics web application, their access level (Administrator), and what their permissions are to access and configure specific views and publish targets within the PI Integrator for Business Analytics user interface (UI).

TitleResults for “How to create a CRG?”Also Available in