PI Integrator Framework Security
- Last UpdatedJun 25, 2025
- 1 minute read
There are three general areas to consider when planning security for PI Integrator for Business Analytics:
-
Application security – Defines best practices to secure the PI Integrator for Business Analytics services, such as defensive measures against Denial of Service (DoS) attacks.
-
Data security — Determines which users are granted access to data in PI AF and how that security is managed.
Note: The security of the published data that resides on the designated target needs to be considered. Published data security is handled and managed within the publish target itself. For more information on managing access to target data, see Secure views for an identity.
-
User Access security — Defines which users are granted access to the PI Integrator for Business Analytics web application, their access level (Administrator), and what their permissions are to access and configure specific views and publish targets within the PI Integrator for Business Analytics user interface (UI).
Related Links
- Application security
- User access permissions
- View Access Permissions
- Manage permissions
- How to secure views
- Migrate to AF identity-based data security
- Run the Identity Migration Tool interactively
- Run the Identity Migration Tool using command-line arguments
- Examples of input parameters for IdentityMigrationTool
- Secure views for an identity