Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

PI System Management Tools

PI point access permissions

  • Last UpdatedOct 04, 2024
  • 2 minute read

Access to PI points is initially controlled by the PIPOINT entry in the Database Security tool in PI System Management Tools (SMT). While this sets a baseline for access permissions, it is important to note that individual PI points can be configured with more permissive access settings. This is achieved through the DataSecurity or PtSecurity attributes for each point, allowing granular control over who can read or write to specific points.

Types of security settings

PI point security consists of data security and point security.

Type of security

Description

Data security

Determines who can access the point's data values, including snapshot and archive data.

Point security

Governs who can access and configure the point's attributes like Zero, Span, Descriptor, and other settings.

You can have different access permissions for a point's attributes than for the point's data. For example, a user might be allowed to edit a point's data, but not to edit that point's attributes.

  • Data Security

    To view and edit point data, you also need read access to point security. If users do not have permission to view a point's attributes, they generally cannot see that point's data, because client applications require access to the point attributes to retrieve the data.

  • Point Security

    To view point attributes, you need read access to PIPOINT, and read access to the point security for the point itself. Similarly, to edit a point's attributes, you need read/write access to PIPOINT, and read/write access to the configuration for the point itself.

Configuring access permissions

You can set permissions at the point level to be more permissive than those defined by PIPOINT. This flexibility allows:

  • Enhanced operational control: Grant broader access to critical points for specific users or groups.

  • Customized security settings: Apply stricter access to points handling sensitive data, regardless of more lenient general access levels.

Common tasks and the required permissions

The following table lists required access permissions for basic tasks.

Task

Required access permissions

View point data

Read access to PIPOINT, DataSecurity, and PtSecurity for that point

Edit point data

Read-write access to DataSecurity for that point; read access to PtSecurity and PIPOINT

View point attributes

Read access to PIPOINT and to PtSecurity for that point

Edit point attributes

Read access to PIPOINT and read-write Point Security for that point

Create a point

Read-write access to PIPOINT

Delete a point

Read-write access to PIPOINT and to PtSecurity for that point

Add a user to data security

Read-write access to both DataSecurity and PtSecurity

Edit a user's data security settings

Read-write access to both DataSecurity and PtSecurity

In This Topic
TitleResults for “How to create a CRG?”Also Available in