Unfortunately, we are experiencing an issue with our multiple-user registration functionality.

At this time, we suggest you register individuals one at a time for a class.

If you're experiencing recurring issues, we're here to help at: AVEVATraining@aveva.com

Our IT team is currently working on this issue. We will update you once the problem has been resolved.

Please accept our apologies for the inconvenience caused.

Configuring PI Data Archive Security

Learn how PI Identities and PI AF Identities are mapped to applications and active directory accounts and how custom permissions are configured for each of these identities

rate limit

Code not recognized.

About this course

Note: This course shares many outcomes with the PI System Administration: Basics and PI System Administration: Beyond the Basics courses and has been, for the most part, superseded by those courses. However, the Configuring PI Data Archive Security course does go into more depth regarding older technologies and special case configuration than these new courses. We have decided to have this course remain available for purchase, but we recommend going through the learning outcomes and auditing the video content to make sure it contains the outcomes you need before making a purchase.

In this course, you will learn the skills necessary to configure security on the PI Data Archive using OSIsoft best practices. Specifically, you will learn how to create the PI Identities and assign them custom permissions on different areas of the PI Data Archive corresponding to the security needs of your users. Additionally, this course will over how to tighten down your security model to allow the minimum permissions needed for users and applications.

By the end of the course, you will be able to:

  • Create a custom PI System security plan that makes sense for your PI System.
  • Enable PI API and PI SDK applications to connect to your PI System.
  • Create security identities with minimal PI System permissions.
  • Map your incoming PI System connections to appropriate PI System identities.
  • Troubleshoot common authentication, permission, and connection problems.

Audience

This course is best suited for a PI System administrator who is responsible for setting up and maintaining how users and applications connect and authenticate with the PI System. It is designed to help perform security-related administrative tasks as well as introduce the tools available for common security management.

Level: Introductory

Study Time: 12 hours

Course Access: Unlimited access to all content except the Training Cloud Environment (TCE). You have 30 days access to the TCE starting on the day you access module section "Launch Cloud Environment". 

After those 30 days you can purchase additional access with one of the two options below:

Prerequisites

  • Basic knowledge of Windows Active Directory users and groups.
  • PI System Basics: typical PI System components and architectures, understanding PI Points, searching PI points.
  • A computer that can access our YouTube content, and pass our connection test

Students without prior knowledge of the PI System should review Chapter 1: PI System Basics of the PI System Administration workbook.

Software Requirements

  • In this course, we will work with the cloud environment which contains the following components:
    • Access to AD users/groups
    • PI Data Archive 3.4.380 or later.
    • PI AF Server 2016 or later.
    • An interface using PI API and PI Buffer Subsystem 2016 or later.

This Course Includes...

  • Videos, exercises and quizzes to help you learn the material
  • A Cloud Environment accessible for 30 days and configured to complete all the exercises in the course
  • Sharable certificate of completion.
  • This course is self-paced for your convenience. Thus, there are no live components to the course, nor are there required login hours. Please use the video lectures for instruction along with the course exercises to gain hands-on experience working with key concepts.
  •  There are 7 hands-on knowledge checks tailored to apply the knowledge you've learned in the video lectures. 
  • Once you register for a course, you will have access to the course materials 24/7 on this website.

Further Information

  • This is a self-paced course. Any questions or assistance needed about the material can be asked in this course's space in the OSIsoft PI Square community
  • When you complete the examination at the end of the course, you will receive a certificate of completion which can be shared and directly posted on LinkedIn.
  • For more information about our Online Courses please visit our FAQ page

Course Material

Course Outline

  • Getting Started
  • How to Navigate This Course
  • Discussion Forum
  • Offline Course Videos for Blocked YouTube Users
  • Course Workbook
  • Training Cloud Environments
  • Launch Cloud Environment
  • Lesson 1 - Gaining Administrator Access
  • Knowledge Check: Gaining Administrator Access
  • Lesson 2 - Introduction to PI Data Archive
  • What are Identities, Mapping, & Trusts? (High Level PI Server Security Map) (5:49)
  • Data Archive Security Deep Dive Map - Security Areas, Defaults and Customization (16:54)
  • Lesson 3 - Online Courses's Example Security Model
  • Demo of Custom Data Archive Security Plan in Action (9:06)
  • Knowledge Check: Who and What Else Needs Access?
  • Lesson 4 - Configuring Security
  • Configure Overall PI Data Archive Security for Users and SDK Applications (24:45)
  • Knowledge Check: Granting User and Application Access
  • Setup Custom Security on PI Points for Both Users and Applications (20:02)
  • Knowledge Check: Granting Access in Bulk
  • Configuring Minimum Permissions for PI Interfaces and Buffering (13:01)
  • Knowledge Check: Securing Interface Access
  • Disable the Least Secure Authentication Options on Your Data Archive (8:27)
  • Configure Windows Credentials for a Workgroup Interface Machine (16:59)
  • Knowledge Check: Granting Access From Outside a Domain
  • Create, Map, and Grant Permissions to Custom Identities in AF Server 2015 (13:18)
  • Knowledge Check: Selectivity Secure AF Elements
  • Lesson 5 - Troubleshooting Security Issues
  • Basic Data Archive Security Troubleshooting - Check Common Errors and User Authentication (14:13)
  • Advanced PI Data Archive Security Troubleshooting - Check Connections/Permissions in PI SMT (18:49)
  • Lesson 6 - Create a Custom Security Plan
  • Create a Custom Security Plan with out Online Course Security Plan Worksheet (23:56)
  • Final Exam
  • Final Exam
  • Course Evaluation
  • How did it go?
  • Next Steps
  • Additional Resources
  • End of the Course

About this course

Note: This course shares many outcomes with the PI System Administration: Basics and PI System Administration: Beyond the Basics courses and has been, for the most part, superseded by those courses. However, the Configuring PI Data Archive Security course does go into more depth regarding older technologies and special case configuration than these new courses. We have decided to have this course remain available for purchase, but we recommend going through the learning outcomes and auditing the video content to make sure it contains the outcomes you need before making a purchase.

In this course, you will learn the skills necessary to configure security on the PI Data Archive using OSIsoft best practices. Specifically, you will learn how to create the PI Identities and assign them custom permissions on different areas of the PI Data Archive corresponding to the security needs of your users. Additionally, this course will over how to tighten down your security model to allow the minimum permissions needed for users and applications.

By the end of the course, you will be able to:

  • Create a custom PI System security plan that makes sense for your PI System.
  • Enable PI API and PI SDK applications to connect to your PI System.
  • Create security identities with minimal PI System permissions.
  • Map your incoming PI System connections to appropriate PI System identities.
  • Troubleshoot common authentication, permission, and connection problems.

Audience

This course is best suited for a PI System administrator who is responsible for setting up and maintaining how users and applications connect and authenticate with the PI System. It is designed to help perform security-related administrative tasks as well as introduce the tools available for common security management.

Level: Introductory

Study Time: 12 hours

Course Access: Unlimited access to all content except the Training Cloud Environment (TCE). You have 30 days access to the TCE starting on the day you access module section "Launch Cloud Environment". 

After those 30 days you can purchase additional access with one of the two options below:

Prerequisites

  • Basic knowledge of Windows Active Directory users and groups.
  • PI System Basics: typical PI System components and architectures, understanding PI Points, searching PI points.
  • A computer that can access our YouTube content, and pass our connection test

Students without prior knowledge of the PI System should review Chapter 1: PI System Basics of the PI System Administration workbook.

Software Requirements

  • In this course, we will work with the cloud environment which contains the following components:
    • Access to AD users/groups
    • PI Data Archive 3.4.380 or later.
    • PI AF Server 2016 or later.
    • An interface using PI API and PI Buffer Subsystem 2016 or later.

This Course Includes...

  • Videos, exercises and quizzes to help you learn the material
  • A Cloud Environment accessible for 30 days and configured to complete all the exercises in the course
  • Sharable certificate of completion.
  • This course is self-paced for your convenience. Thus, there are no live components to the course, nor are there required login hours. Please use the video lectures for instruction along with the course exercises to gain hands-on experience working with key concepts.
  •  There are 7 hands-on knowledge checks tailored to apply the knowledge you've learned in the video lectures. 
  • Once you register for a course, you will have access to the course materials 24/7 on this website.

Further Information

  • This is a self-paced course. Any questions or assistance needed about the material can be asked in this course's space in the OSIsoft PI Square community
  • When you complete the examination at the end of the course, you will receive a certificate of completion which can be shared and directly posted on LinkedIn.
  • For more information about our Online Courses please visit our FAQ page

Course Material

Course Outline

  • Getting Started
  • How to Navigate This Course
  • Discussion Forum
  • Offline Course Videos for Blocked YouTube Users
  • Course Workbook
  • Training Cloud Environments
  • Launch Cloud Environment
  • Lesson 1 - Gaining Administrator Access
  • Knowledge Check: Gaining Administrator Access
  • Lesson 2 - Introduction to PI Data Archive
  • What are Identities, Mapping, & Trusts? (High Level PI Server Security Map) (5:49)
  • Data Archive Security Deep Dive Map - Security Areas, Defaults and Customization (16:54)
  • Lesson 3 - Online Courses's Example Security Model
  • Demo of Custom Data Archive Security Plan in Action (9:06)
  • Knowledge Check: Who and What Else Needs Access?
  • Lesson 4 - Configuring Security
  • Configure Overall PI Data Archive Security for Users and SDK Applications (24:45)
  • Knowledge Check: Granting User and Application Access
  • Setup Custom Security on PI Points for Both Users and Applications (20:02)
  • Knowledge Check: Granting Access in Bulk
  • Configuring Minimum Permissions for PI Interfaces and Buffering (13:01)
  • Knowledge Check: Securing Interface Access
  • Disable the Least Secure Authentication Options on Your Data Archive (8:27)
  • Configure Windows Credentials for a Workgroup Interface Machine (16:59)
  • Knowledge Check: Granting Access From Outside a Domain
  • Create, Map, and Grant Permissions to Custom Identities in AF Server 2015 (13:18)
  • Knowledge Check: Selectivity Secure AF Elements
  • Lesson 5 - Troubleshooting Security Issues
  • Basic Data Archive Security Troubleshooting - Check Common Errors and User Authentication (14:13)
  • Advanced PI Data Archive Security Troubleshooting - Check Connections/Permissions in PI SMT (18:49)
  • Lesson 6 - Create a Custom Security Plan
  • Create a Custom Security Plan with out Online Course Security Plan Worksheet (23:56)
  • Final Exam
  • Final Exam
  • Course Evaluation
  • How did it go?
  • Next Steps
  • Additional Resources
  • End of the Course