Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

PI Interface for Ramp Soak Simulator Data

Security

  • Last UpdatedNov 23, 2022
  • 2 minute read

This interface simulator requires security configuration, as described in this section.

  • Windows

    The PI Firewall Database and the PI Proxy Database must be configured so that the interface is allowed to write data to the Data Archive. See "Modifying the Firewall Database" and "Modifying the Proxy Database" in theData Archive section of the PI Server user guide.

    Note that the Trust Database, which is maintained by the Base Subsystem, replaces the Proxy Database used prior to PI version 3.3. The Trust Database maintains all the functionality of the proxy mechanism while being more secure.

    See "Trust Login Security" in the chapter "Managing Security" of the PI Data Archive System Management Guide.

    If the interface cannot write data to the Data Archive because it has insufficient privileges, a ‑ 10401 error will be reported in the PI Message Log. If the interface cannot send data to a PI2 Server, it writes a -999 error. See the section Error and informational messages for additional information on error messaging.

  • PI Data Archive v3.3 and Higher

    Security configuration using piconfig

    For Data Archive v3.3 and higher, the following example demonstrates how to edit the PI Trust table:

    C:\PI\adm> piconfig
    @table pitrust
    @mode create
    @istr Trust,IPAddr,NetMask,PIUser
    a_trust_name,192.168.100.11,255.255.255.255,piadmin
    @quit

    For the above,

    Trust: An arbitrary name for the trust table entry; in the above example,

    a_trust_name

    IPAddr: the IP Address of the computer running the interface; in the above example,

    192.168.100.11

    NetMask: the network mask;

    255.255.255.255

    specifies an exact match with IPAddr.

    PIUser: the PI user the interface to be entrusted as;

    piadmin

    is usually an appropriate user.

  • Security Configuring using Trust Editor

    The Trust Editor plug-in for PI System Management Tools 3.x may also be used to edit the PI Trust table.

    See the PI System Management chapter in the PI Data Archive user guide for more details on security configuration.

  • PI Data Archive v3.2

    For Data Archive v3.2, the following example demonstrates how to edit the PI Proxy table:

    C:\PI\adm> piconfig
    @table pi_gen,piproxy
    @mode create
    @istr host,proxyaccount
    piapimachine,piadmin
    @quit

    In place of piapimachine, put the name of the interface node as it is seen by the Data Archive.

TitleResults for “How to create a CRG?”Also Available in