Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

PI Universal Interface UniInt Framework

Enable access for the PI identity

  • Last UpdatedApr 03, 2023
  • 1 minute read

Use PI SMT or piconfig to allow the interface access to start and write data to Data Archive. Use PI Tag Configurator in PI SMT to configure point permissions for large point counts. The PI trust database is also sometimes referred to as the trust table.

  1. Grant the PI identity in the PI trust that authenticates the interface instance the following permission:

    PI database security

    Permission

    PIPOINT

    r

  2. Grant the same database security permissions to each instance of the interface.

  3. Configure all the PI points created for the interface to grant the interface read and possibly write access to the points.

    To grant the interface access to the points, set the permissions for the PI identity assigned to the PI trust for the interface. Configure access using the point security (ptsecurity) and data security (datasecurity) attributes. Necessary access depends on the buffering configuration:

    • For interface instances that access interface points, grant read permission in the point security attribute.

    • For interface instances running on unbuffered interface nodes, where the interface instance sends point updates directly to Data Archive, grant read and write access to the PI identity in the PI trust that authenticates the interface instance using the data security attribute.

    • For interfaces running on buffered interface nodes, where the interface instance sends point updates to the buffering application which then relays updates to Data Archive, grant read access to the PI identity in the PI trust that authenticates the interface instance.

      PI point database security

      Permission

      ptsecurity

      r

      datasecurity (for unbuffered data)

      r, w

      datasecurity (for buffered data)

      r

TitleResults for “How to create a CRG?”Also Available in