OSIsoft: Configure PI Tag Security by Associating Identities with Tags. v2010





The interactive transcript could not be loaded.



Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Sep 20, 2011

To configure PI Tag security you associate PI Identities with either a PI tag's point definition or real-time data history. Then you specify what privileges (none, read, or read/write) are granted to that identity. In this way, Windows users or groups associated with the PI Identities can be allowed or disallowed access to editing PI Point definitions and data.

At http://youtube.com/watch?v=nKaA_Q_D4V... you can see where this video is in the sequence of videos on this topic.

If you are a subscriber to our Virtual Learning Lab Environment at http://learning.osisoft.com/Virtual_L... you can log in to your own personal PI System to use for practice and testing. Video content is copyright of OSIsoft, LLC - 2011. All rights reserved. Any redistribution or reproduction of part or all of the contents in any form is prohibited other than for your personal and non-commercial use.

  • Category

  • License

    • Standard YouTube License


When autoplay is enabled, a suggested video will automatically play next.

Up next

to add this to Watch Later

Add to

Loading playlists...