Exercise 4

Version 1

    Exercise 4 - Once you have viewed the videos on PI Data Archive security, make a list of the various users \ groups of users that will be connecting to your PI System. If in a domain, which Active Directory groups can you use to optimize your security plan? How many PI Identities will you need to cover the various levels of access, and what permissions will each of the PI Identities require?