Exercise 2

Version 2

    Exercise 2 - Once you have viewed the videos on What are Identities, Mappings, & Trusts? (High Level PI Server Security Map), PI Data Archive Security Deep Dive Map- Security Areas, Defaults, & Customization, and Demo of Custom PI Data Archive Security Plan in Action, think about what users\groups you have in your organization and what access permissions they need. Make a list of these users\groups and the types of data in your PI System that will have different security needs. Additionally, write down any applications, especially PI Interfaces, you use in your PI System.