Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

PI System Connector

Security best practices for PI System Connector

  • Last UpdatedFeb 20, 2024
  • 1 minute read

The PI System Connector utilizes AF SDK to read data from the source PI System. The user account the connector executes under must have read access to all AF objects associated with the connector data source, the AF database, and the UOM database on the AF side. The user must also have read access in Point Security and Data Security attributes of all PI points to be collected and read access to the PIPOINT database of any specified source Data Archive. Refer to the AF Security hierarchy documentation for property security setup.

Related Links
TitleResults for “How to create a CRG?”Also Available in