Security configuration in PI AF
- Last UpdatedJul 09, 2023
- 1 minute read
- PI System
- PI Server 2018
- PI Server
PI AF 2015 (version 2.7) and later uses a security model that is similar to that which Data Archive uses. This model relies on integrated Windows security for authentication, but provides its own authorization to PI AF objects using PI AF identities and mappings.
Note: The security configuration information described in this section presumes a PI AF 2015 server and a PI AF 2015 client.
The PI AF security model enables administrators to configure access for PI AF identities at each level of the PI AF hierarchy. PI AF uses Windows integrated security to grant or deny connection to the PI AF server, to view or edit databases, and to change collections.
For information on how to implement security on Data Archive, see Introduction to PI Data Archive security.
Video
For information on how to create, map, and grant permissions to PI AF identities, watch this video:
Related Links
- PI AF identities and mappings
- Built-in PI AF identities
- Security hierarchy
- List of security inheritance for objects
- List of access permissions
- Scenarios for using the Deny permission option
- Security Configuration window
- Security for PI AF server
- PI AF database security
- PI AF collection security
- PI AF object security
- Configure security for the UOM database
- Differences from Data Archive security model