Security configuration for AVEVA Vision AI Assistant
- Last UpdatedFeb 12, 2024
- 2 minute read
In addition to the technologies and architectural practices that ensure high security for AVEVA Vision AI Assistant, access is also restricted by security roles. You must be assigned to roles to have access to the relevant functions. Security protocols are also in place when interacting with other AVEVA products or external solutions.
Authentication and Authorization
AVEVA Vision AI Assistant is integrated with the Platform Common Services (PCS) framework that is configured during installation. PCS implements certificates and configures the use of the HTTPS port. AVEVA Identity Manager ensures user authentication and authorization.
Connect to AVEVA Insight
Connections to AVEVA Insight require a bearer token. The token generated in AVEVA Insight must be provided to AVEVA Vision AI Assistant to allow connections to AVEVA Insight. You need Administrator privileges on AVEVA Insight to generate the bearer token.
Connect to AVEVA System Platform
System Platform uses the PCS framework and does not require any additional security configuration.
Connect to a camera programmatically
You can connect to a camera programmatically using REST APIs securely with application tokens. Configure the application tokens in AVEVA Vision AI Assistant and use it in the API calls from the external source.
The following table lists the security areas that you need to configure for AVEVA Vision AI Assistant and the details of the section(s) in this help that provide the corresponding instructions.
|
Security Area(s) |
Topic(s) in this help |
Summary |
|---|---|---|
|
Secure access to AVEVA Insight |
Configure the token provided by AVEVA Insight to allow secure connections. |
|
|
Secure Systems through Authentication and Authorization |
Use the Configurator to configure certificates and the HTTPS port. |
|
|
Manage secure tokens |
Configure the secure token for programmatic calls from external sources. |
|
|
Manage users and groups |
Use the Configurator to configure security roles. |