Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Sep 20, 2011
To configure PI Tag security you associate PI Identities with either a PI tag's point definition or real-time data history. Then you specify what privileges (none, read, or read/write) are granted to that identity. In this way, Windows users or groups associated with the PI Identities can be allowed or disallowed access to editing PI Point definitions and data.
If you are a subscriber to our Virtual Learning Lab Environment at http://learning.osisoft.com/Virtual_L... you can log in to your own personal PI System to use for practice and testing. Video content is copyright of OSIsoft, LLC - 2011. All rights reserved. Any redistribution or reproduction of part or all of the contents in any form is prohibited other than for your personal and non-commercial use.