Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

Asset Framework and PI System Explorer (PI Server 2018)

Differences from Data Archive security model

  • Last UpdatedJan 11, 2023
  • 1 minute read

Although the security model is similar to that which Data Archive uses, there are a number of differences:

  • The Deny privilege is supported. See Scenarios for using the Deny permission option.

  • A more expansive set of access permissions is available. See List of access permissions.

  • The equivalent of PI user and PI group identities are not supported.

  • PI trusts and PI explicit logins are not supported.

  • The concept of an undeletable flag on an identity or mapping is not supported.

  • Mappings cannot be disabled. Only PI AF identities can be disabled.

  • A single Windows user identity can be mapped to more than one PI AF identity.

  • A different built-in set of identities is installed: Administrators, Engineers, and World.

TitleResults for “How to create a CRG?”Also Available in