Best practices for buffering security
- Last UpdatedDec 16, 2024
- 1 minute read
When planning security for buffering, we recommend that you first familiarize yourself with documented security considerations and requirements for your version of PI Buffer Subsystem.
To maximize security, we recommend configuring PI Buffer Subsystem to log on as a dedicated domain user account. For more information, see PI Buffer Subsystem security considerations.
If your site does not have a domain, you can still use Windows authentication. For more information, see the knowledge base article KB 00354 - Supported Windows Security Configurations in Domains and Workgroups for the PI Data Archive.