Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

Asset Framework and PI System Explorer (PI Server 2018)

Permissions tab

  • Last UpdatedJan 11, 2023
  • 2 minute read

You can view and configure access permissions for individual or multiple items by identity on the Permissions page of the Security Configuration window.

Permissions

Items to Configure list

The content of the Items to Configure list is determined by the hierarchy context and indicates whether you can configure access permissions for the entire PI AF hierarchy, a single database and containers, or a single container and single object.

Four examples of the Items to Configure list that include a a list of objects for an AF Server, a single database, a container, and a single object.

To configure access permissions for only some of the items, you can clear those you do not want to configure.

Identities list

The Identities list contains a list of identities that have permissions for all checked items in the Items to configure list. You use the Add and Remove functions to manage which identities appear on the list.

If the currently connected PI AF server does not support identities (PI AF 2014 or earlier), the Security Configuration window displays access permissions for Groups or Users and you can add and remove Windows accounts using standard Active Directory windows.

Permissions list

As each identity is selected in the Identities list, the permissions associated with that identity for the checked entries in the Items to Configure list are shown in the Permissions list. You can allow or deny permissions as desired for each identity without losing the changes. The access permissions you set for each identity are retained until you click the OK, Cancel, or Apply button.

Note: If more than one Items to Configure entry is selected and the currently selected identity has one of the permissions in one or more, but not all entries selected in the Items list, the checkbox for that permission displays a dot () to indicate some entries in the Items list have the permission set whereas some do not.

In This Topic
TitleResults for “How to create a CRG?”Also Available in