Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ PI Server Installation and Configuration (PI Server 2018)

Why use Windows Integrated Security?

  • Last UpdatedJan 13, 2023
  • 1 minute read

Windows Integrated Security provides substantial advantages in security, efficiency, and flexibility:

  • Less work for Data Archive administrators

    You no longer need to create and manage individual user accounts on the Data Archive server. When a user enters, leaves, or changes roles, you only need to modify the Windows configuration. Data Archive security automatically reflects these changes. You also get complete traceability of the specific Windows account in the Data Archive log and audit trail records.

  • Single-sign on for users

    Users need only log on to their Windows account. PI clients will automatically authenticate through the PI SDK. No additional Data Archive login is required.

  • Improved Security:

    • Secure authentication

      Connections are authenticated through Microsoft's Security Support Provider Interface (SSPI). If you're using AD, then this means the most secure Kerberos authentication, which greatly improves your Data Archive security.

    • Control over server-side authentication policies

      With the new security model, you have control over the authentication protocols that client applications can use to connect to the Data Archive server. You can disable authentication methods that are less secure and keep only the connection methods that you need.

  • More control over access permissions

    The new security model includes a much more flexible model for access permissions. In previous versions of the Data Archive server you could set permissions only for one owner, one user group, and for world access (everyone else). With the new security model, each Data Archive resource can have read and/or write permissions defined for any number of PI identities.

TitleResults for “How to create a CRG?”Also Available in