Security best practices for PI System Connector
- Last UpdatedFeb 20, 2024
- 1 minute read
- PI System
- PI System Connector 2.5.4
- Connectors
The PI System Connector utilizes AF SDK to read data from the source PI System. The user account the connector executes under must have read access to all AF objects associated with the connector data source, the AF database, and the UOM database on the AF side. The user must also have read access in Point Security and Data Security attributes of all PI points to be collected and read access to the PIPOINT database of any specified source Data Archive. Refer to the AF Security hierarchy documentation for property security setup.