List of security inheritance for objects
- Last UpdatedDec 19, 2024
- 2 minute read
- PI System
- PI Server 2024 R2
- PI Server
The following table provides details on the security that is required to create specific objects.
|
Object |
Security inheritance |
|---|---|
|
Element |
A child element inherits the security of its parent element if it is added as a Parent-Child (strong) or Composition reference. For more information, see Understand permission inheritance of element objects. The security rights of an element created at the database level are derived from the Element collection associated with a PI AF database. For more information, see PI AF collection security. |
|
Event frame |
A child event frame inherits the security of its parent event frame if it is added as a Parent-Child (strong) reference. If an event frame does not have a Parent-Child reference, security rights are derived from the event frame template if it was created from a template. If it was not created from a template, security rights are derived from the Event Frame collection associated with a PI AF database. Note: To allow users to make changes to event frames that are based on a template, but prevent them from modifying the source template, you configure security rights on the event frame template by setting the following access permissions for the associated PI AF identities:
|
|
Transfer |
If a transfer is created from a template, security rights are derived from the template. If it was not created from a template, security rights are derived from the Transfer collection associated with a PI AF database. |
|
Case |
Security rights are derived from the analysis that owns the case. |
For all other types of objects, initial security access rights are calculated from the corresponding collection associated with a PI AF database. For example, security access rights for a notification are initially derived from a PI AF database's Notification Rule collection.
Note: When an analysis or analysis template is associated with a legacy notification or notification template, (Notifications 2012 or earlier), security access rights for the two objects are synchronized.