Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ XR Studio

Create a standard release package

  • Last UpdatedJul 25, 2024
  • 1 minute read

If the application nodes do not need specific configuration settings, then follow these steps for the distribution.

Player nodes

  1. Copy \_release folder and rename it as \PlayerX (where x is 0..3).

  2. Enter the \PlayerX folder.

  3. Start XR Settings and set the player settings.

    Typical settings to perform are those related to the networking like Message.name, Message.Name.

  4. Save and exit.

Instructor Station node

  1. Copy \_release folder and rename it as \InstructorStation.

  2. Enter the \InstructorStation folder.

  3. Start XR Settings and set the Instructor Station settings.

    The typical settings to set are those that relate to networking, such as Message.Name.

    Instructor station needs the application to be set in windowed mode and mouse visibility.

  4. Save and exit.

    Bridge node

    If not yet available, create a folder called \Bridge and copy the bridge files to it.

    Use the bridge with other nodes

    1. Copy project Bridging Configuration into the \Bridge folder.

    2. Copy the license.mwpl file found in \_release folder into \Bridge folder.

      Cybersecurity Note

      Not all configurations can run properly on a given deploy and certain engine configurations can expand the potential attack surface of the solution.

      We strongly advise the following measures:

      • On deployment, restrict write permission of configuration files to Administrator users only. 

      • Restrict application use to lower level users than admin, so that they will not be able to tamper with configuration files, either with a text editor or with the Configurator tool.

      After the solution has been delivered, the goals are to maintain the flexibility for future changes by an Administrator user, but also to protect the application against malicious attempts by other users.

      In This Topic
      Related Links
      TitleResults for “How to create a CRG?”Also Available in