Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

PI System Management Tools

Ping security permissions

  • Last UpdatedOct 04, 2024
  • 1 minute read

Permission Type

Requirements

File System

Not used

Registry Access

Not used

Service Control Manager

Not used

The following table lists access permissions required for PI point-related tasks.

Permission Type

Requirements

View Existing Points

PIPOINT (r), PtSecurity (r) for the individual points

Create Points

PIPOINT (r,w)

Edit Points

PIPOINT (r), PtSecurity (r,w) for the individual points

TitleResults for “How to create a CRG?”Also Available in