Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

PI Builder (PI Server 2024 R2)

Understand security and mapping types

  • Last UpdatedDec 13, 2024
  • 1 minute read

You can use PI Builder to retrieve, edit, and delete PI identities and mappings, as well as PI AF identities and mappings.

Mapping types

The MappingType column header indicates the authentication method used to verify a user's identity and permission in PI Data Archive or PI AF. The mapping type name is only required for new mappings and can only be set when a new mapping is created. There are four security mapping types:

  • Windows: Uses Windows authentication to grant user access to the PI System.

  • OIDC: Uses OpenID Connect (OIDC) or claims-based authentication to grant user access to the PI System. This mapping type is used to create a mapping for a specific claim that exists on an access token.

  • Role: Uses OIDC authentication to grant access to the PI System. This mapping type is used to map to CONNECT roles, which have their own sets of permissions, and Windows groups that exist on the same machine that the AVEVA Identity Manager server is installed.

  • ClientCredential: Uses OIDC authentication to enable explicit sign on to the PI System using a client Id that was created on the AIM server.

TitleResults for “How to create a CRG?”Also Available in