Exercise 2: Who and What Else Needs Access?

Document created by kholstein Employee on Jun 20, 2016Last modified by jkim on May 31, 2018
Version 3Show Document
  • View in full screen mode

Exercise 2 - Once you have viewed the videos on What are Identities, Mappings, & Trusts? (High Level PI Server Security Map) , PI Data Archive Security Deep Dive Map- Security Areas, Defaults, & Customization, and Demo of Custom PI Data Archive Security Plan in Action, you will have a basic understanding of how Active Directory users and groups are to be mapped to PI Identities, and through those PI Identities, receive different security permissions to perform different tasks within the PI System.

 

The goal of this exercise is to think about what users and groups you have in your organization and what kinds of PI System tasks they will need to perform. After consideration, make a list of these users and groups and determine what permissions they will need to perform those tasks. Additionally, note any applications like PI Interfaces or client tools you use in your PI System and what tasks they will need to perform.

Attachments

    Outcomes