Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

Analytics and Notifications for PI System Explorer (PI Server 2018)

Learn about security for notifications

  • Last UpdatedJan 10, 2025
  • 1 minute read

The notifications feature uses Windows security for communicating internally and with the PI AF server.

Note: See the PI Server topic PI AF objects and local permissions for PI Notifications Service for information on PI Notifications Service account permissions.

You can secure access to notification rules, notification rule templates, contacts, and contact templates. Object permissions are granted according to the PI AF Security model.

If Windows Active Directory access is configured, information is accessed to create individual contacts. You cannot delete an Active Directory contact from PI System Explorer, and you cannot modify security settings for the contact. To configure Active Directory access, see the PI Server topic Configure Active Directory objects for delegation.

If you are using a screenshot feature in your email delivery format, see the security guidelines in the PI Server Installation and Upgrade guide topic Trusted sites for screenshots. For more information, see also Add a screenshot in notification email delivery format and Add a domain to the list of trusted sites.

In line with PI Asset Framework, Notifications supports Windows environments that enforce the use of U.S. Federal Information Processing Standards (FIPS) cryptographic algorithms. For more information, see Support for FIPS section in PI System Explorer and Microsoft Support article "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing" security setting effects in Windows XP and in later versions of Windows.

TitleResults for “How to create a CRG?”Also Available in