Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

Buffering and High Availability

Best practices for buffering security

  • Last UpdatedDec 16, 2024
  • 1 minute read

When planning security for buffering, we recommend that you first familiarize yourself with documented security considerations and requirements for your version of PI Buffer Subsystem.

To maximize security, we recommend configuring PI Buffer Subsystem to log on as a dedicated domain user account. For more information, see PI Buffer Subsystem security considerations.

If your site does not have a domain, you can still use Windows authentication. For more information, see the knowledge base article KB 00354 - Supported Windows Security Configurations in Domains and Workgroups for the PI Data Archive.

TitleResults for “How to create a CRG?”Also Available in