Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Vision AI Assistant

Security configuration for AVEVA Vision AI Assistant

Security configuration for AVEVA Vision AI Assistant

  • Last UpdatedFeb 12, 2024
  • 2 minute read

In addition to the technologies and architectural practices that ensure high security for AVEVA Vision AI Assistant, access is also restricted by security roles. You must be assigned to roles to have access to the relevant functions. Security protocols are also in place when interacting with other AVEVA products or external solutions.

Authentication and Authorization

AVEVA Vision AI Assistant is integrated with the Platform Common Services (PCS) framework that is configured during installation. PCS implements certificates and configures the use of the HTTPS port. AVEVA Identity Manager ensures user authentication and authorization.

Connect to AVEVA Insight

Connections to AVEVA Insight require a bearer token. The token generated in AVEVA Insight must be provided to AVEVA Vision AI Assistant to allow connections to AVEVA Insight. You need Administrator privileges on AVEVA Insight to generate the bearer token.

Connect to AVEVA System Platform

System Platform uses the PCS framework and does not require any additional security configuration.

Connect to a camera programmatically

You can connect to a camera programmatically using REST APIs securely with application tokens. Configure the application tokens in AVEVA Vision AI Assistant and use it in the API calls from the external source.

The following table lists the security areas that you need to configure for AVEVA Vision AI Assistant and the details of the section(s) in this help that provide the corresponding instructions.

Security Area(s)

Topic(s) in this help

Summary

Secure access to AVEVA Insight

Connect to AVEVA Insight – News tab

Publish an anomaly score as a tag to AVEVA Insight

Configure the token provided by AVEVA Insight to allow secure connections.

Secure Systems through Authentication and Authorization

Configure the System Management Server

Use the Configurator to configure certificates and the HTTPS port.

Manage secure tokens

Application tokens

Configure the secure token for programmatic calls from external sources.

Manage users and groups

Configure security roles

Use the Configurator to configure security roles.

In This Topic
Related Links
TitleResults for “How to create a CRG?”Also Available in