Buffering and security
- Last UpdatedJan 13, 2023
- 1 minute read
There are a number of things to consider when setting up security for PI Buffer Subsystem. If you have not configured buffering before, see Configure PI Buffer Subsystem security for information about the security required for buffering. Even if you have configured buffering before, you may find it helpful to review current security considerations and requirements.
The release of PI Buffer Subsystem 4.3 introduced a few security changes worth noting:
-
To maximize security, we now recommend configuring PI Buffer Subsystem to log on as a dedicated domain user account. For more information, see PI Buffer Subsystem and service logon accounts.
-
Buffering Manager provides step by step configuration, including security. It can create mappings and trusts. However, if you use a domain user account for the PI Buffer Subsystem service, you may want to set up the domain account before you configure buffering using Buffering Manager.
-
Users who need to configure buffering on an interface or client computer no longer need to belong to the local administrators group. Instead, you can add them to the PI Buffering Administrators group created when you install PI Buffer Subsystem 4.3 or later. This group provides the permissions required to use Buffering Manager to configure buffering.