View effective access by user
- Last UpdatedJan 11, 2023
- 2 minute read
- PI System
- PI Server 2018
- PI Server
Use the Effective Access page of the Security Configuration window to view details about a user's access permissions on items in PI AF.
To display a PI AF user's access permissions, you will need the user's Windows domain name.
-
Choose one of the following methods to open the Security Configuration window:
To open from ...
Do this ...
PI AF Server Properties window
-
On the toolbar, click
.
-
In the PI AF Server Properties window, click the Security link.
Select Database window
-
On the toolbar, click the Database button.
-
In the Select Database window, click the Edit Security button.
PI System Explorer browser
-
Right -click an object or collection and click Security.
-
In the PI AF Server Properties window, click the Security link.
-
-
In the Security Configuration window, click the Effective Access tab.
-
In the Domain User field, enter a user's Windows domain name whose permissions you want to view.
-
Press Tab or Enter to validate your entry.
Note: You can click
next to the Domain User field to search for a user's Windows domain name.
The fields and lists on the Effective Access page are populated with the following information:
-
User SID field: Displays the user's security identifier
-
Identities list: Lists all the PI AF identities that are mapped to the Windows domain user account entered in step 3
-
Items to View Access list: Displays the item(s) selected for security configuration. This list is reflective of the item(s) shown in the Items to Configure list on the Permissions card.
-
Permissions list: Displays the access permissions for the currently selected item in the Items to Configure list.
-
-
Click-and-drag the horizontal splitter bar up or down to adjust the amount of information shown in the list boxes.
-
Select a different item in the Items to View Access list.
The user's access permissions for the selected item are displayed in the Permissions list. To learn more about access rights, see List of access permissions.
-
Repeat step 6 as needed to view access permissions for other items.
-
Click OK to exit the Security Configuration window.