Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

Asset Framework and PI System Explorer (PI Server 2018)

Security configuration in PI AF

  • Last UpdatedJul 09, 2023
  • 1 minute read

PI AF 2015 (version 2.7) and later uses a security model that is similar to that which Data Archive uses. This model relies on integrated Windows security for authentication, but provides its own authorization to PI AF objects using PI AF identities and mappings.

Note: The security configuration information described in this section presumes a PI AF 2015 server and a PI AF 2015 client.

The PI AF security model enables administrators to configure access for PI AF identities at each level of the PI AF hierarchy. PI AF uses Windows integrated security to grant or deny connection to the PI AF server, to view or edit databases, and to change collections.

For information on how to implement security on Data Archive, see Introduction to PI Data Archive security.

Video

For information on how to create, map, and grant permissions to PI AF identities, watch this video:

TitleResults for “How to create a CRG?”Also Available in