Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

Asset Framework and PI System Explorer (PI Server 2024 R2)

List of security inheritance for objects

  • Last UpdatedDec 19, 2024
  • 2 minute read

The following table provides details on the security that is required to create specific objects.

Object

Security inheritance

Element

A child element inherits the security of its parent element if it is added as a Parent-Child (strong) or Composition reference. For more information, see Understand permission inheritance of element objects.

The security rights of an element created at the database level are derived from the Element collection associated with a PI AF database. For more information, see PI AF collection security.

Event frame

A child event frame inherits the security of its parent event frame if it is added as a Parent-Child (strong) reference. If an event frame does not have a Parent-Child reference, security rights are derived from the event frame template if it was created from a template. If it was not created from a template, security rights are derived from the Event Frame collection associated with a PI AF database.

Note: To allow users to make changes to event frames that are based on a template, but prevent them from modifying the source template, you configure security rights on the event frame template by setting the following access permissions for the associated PI AF identities:

  • To prevent users from accessing or modifying an event frame template, clear the Allow check box on the Write permission in the Security Configuration window. See Configure security for objects to learn how to set access permissions for PI AF identities.

  • Select the Write Data permission to enable users to make changes to event frames that are based on the template.

  • Select the Read Data permission to give users the ability to view and read the event frame object. Granting the Read Data permission on an object also grants the Read permission.

    See List of access permissions for more information on access permissions.

Transfer

If a transfer is created from a template, security rights are derived from the template. If it was not created from a template, security rights are derived from the Transfer collection associated with a PI AF database.

Case

Security rights are derived from the analysis that owns the case.

For all other types of objects, initial security access rights are calculated from the corresponding collection associated with a PI AF database. For example, security access rights for a notification are initially derived from a PI AF database's Notification Rule collection.

Note: When an analysis or analysis template is associated with a legacy notification or notification template, (Notifications 2012 or earlier), security access rights for the two objects are synchronized.

TitleResults for “How to create a CRG?”Also Available in