Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ PI Server Installation and Configuration (PI Server 2018)

A brief look at Data Archive security

  • Last UpdatedJan 13, 2023
  • 1 minute read

Computer security has two parts: authentication (who is the user, and how do we confirm that the user is really who he or she says?) and authorization (once we know who the user is, what is that user allowed to do?).

The Windows integrated security model relies on Windows security for authentication, but provides its own authorization to PI objects. This is accomplished through two structures: PI identities for which you define PI permissions, and PI mappings which provide the mapping from Windows users and groups to PI identities.

TitleResults for “How to create a CRG?”Also Available in