In this course, you will learn the skills necessary to configure security on the PI Data Archive using OSIsoft best practices. Specifically, you will learn how to create new PI Identities and assign them custom permissions on different areas of the PI Data Archive corresponding to the security needs of your users. Additionally, this course will cover how to tighten down your security model to allow the minimum permissions needed for users and applications.
This course is self-paced for your convenience. Thus, there are no live components to the course, nor are there are required login hours. Please use the video lectures for instruction along with the course exercises to gain hands-on experience working with key concepts. Most importantly, get involved in the discussion forums here on the PI Square community and interact with your peers and experts both at OSIsoft and other organizations, post questions, answer questions posted by others, and overall help each other learn as you would in a classroom environment.
If you’re enrolled in a facilitated session of this course, you also have the opportunity to earn a certificate of completion by submitting a final project to your course facilitator. Please see the final project for details.
This course is primarily suited for a PI System administrator who is responsible for setting up and maintaining how users and applications connect and authenticate with the PI System. It is designed to help perform security related administrative tasks as well as introduce the tools available for common security management.
Basic knowledge of the following: PI System, Active Directory users\groups
This course will leverage a configuration within the OSIsoft Virtual Learning Environment. The Virtual Learning Environment is composed of virtual machines hosted on Microsoft Azure that you can access remotely. Please see Online Course's FAQ for the VLE system requirements.
Below are the video lectures for this course. We have placed the topics in the same order as they would be presented in a live instructor-led course. However, feel free to view the videos in any order, spread over any interval. You can also rewind and rewatch parts of the videos that you need to view again. Also be sure to check out the Online Course Videos - Tips and Tricks if your videos look fuzzy!
Introduction to PI Data Archive Security
Online Course's Example Security Model
Online Course Final Project
Troubleshooting Security Issues (Optional)
Extra Credit - Asset Framework Security!!!
Want to earn a certificate in this course? Register for the next facilitated session here.
Want to work through the course on your own? Register for only the Virtual Learning Environment here.
Currently enrolled in the course? Jump to the discussion forums here.
The following exercises serve to reinforce the concepts learned in the video lectures. We strongly encourage you to try things out in the provided virtual environment, using both the video lectures and the exercises as pointers.
Please note that the facilitator will NEVER ask you to share proprietary information with the class. Additionally, anything shared with the facilitator as proof of work will be destroyed at the end of the course.