Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

Data Archive Administration

Create a trust

  • Last UpdatedOct 02, 2024
  • 2 minute read
  1. Under Servers (or if you have a collective deployment, Collectives and Servers), select the server.

  2. Under System Management Tools, select Security > Mappings & Trusts.

    The Mappings & Trusts tool appears.

  3. Select the Trusts tab.

  4. Click the New button to open the Add Trust Wizard.

  5. Select the Data Archive server name and enter a name for the trust (and, optionally, a description). Click Next.

  6. Select the type of trust to add:

    • PI-API application (this is the right choice for most PI interfaces)

    • PI-SDK application on a Windows NT based OS

  7. Click Next.

    The next screens allow you to define optional information for the PI trust. If you leave a field blank, then that information is not checked for the trust authentication. When you fill in fields, then only applications with matching information can authenticate against this PI trust.

    • Application Name

      This is slightly different for PI API and PI SDK connections.

      • API

        Connecting PI API applications send an identifier called an application process name, or procname. This is a four-character string with an E appended (for example, the procname for the Perfmon interface is PIPeE).

      • SDK

        The full name of the connecting application, including the extension, but not the path (for example, PI-ICU.exe).

    • IP Address

      The IP address of the interface node.

    • Net Mask

      The net mask for the interface node (for example, 255.255.255.255).

      For SDK connections only, you also have the following optional fields:

    • Windows Domain

      The Windows domain of the user who runs the application (for example, osi).

    • Windows Account

      The Windows user name of the user who runs the application (for example, my_account).

  8. Select the PI identity that you want to use for this trust.

    Applications authenticated through this trust have all the access permissions granted to this PI identity. Alternatively, you can select a PI group or a PI user for this step.

TitleResults for “How to create a CRG?”Also Available in