You're now ready to start putting your skills to use!
To complete this course and receive a certificate of completion, you must submit a successful final project before the end of the course period. If you have any questions about this, please contact your course facilitator or ask on the discussion forums.
Create a custom security plan for your organization and either a) model it in your Configuring PI Data Archive Security - Cloud Environment OR b) your own test/development PI System. You may use the same worksheet shown in Create a Custom Security Plan with our Online Course Security Plan Worksheet (Configuring PI Data Archive Security Online Course - Security Plan2017R2.xlsx ), or you may create your own map to record your domain users\groups, the PI Identities you'll associate with them, the permissions you'll assign to each PI Identity, along with any mappings or trusts you will configure. Prepare a document explaining your custom security model along with several screenshots of configurations themselves.
Note: You do not need to include IP address or machine names in your spreadsheet if you plan on sharing it with your course facilitator
The following aspects should be included in your model:
- Custom domain groups and/or service accounts that mirror those of your own organization (please feel free to ask for the facilitators help set these up on your domain controller if you need assistance)
- At least 3 custom PI Identities mapped to different domain groups, each with their own set of relevant database security and PI Point permissions
- Custom PI Point security (both data security and point security) for each type of data in your PI System
- At least 1 PI Interface connecting via minimum permissions. Recall that these minimum permissions are different if you are or are not using buffering (see KB00833 - Seven best practices for securing your PI Server for more details)
How to Submit the Project:
You can simply submit the document explaining your custom security model directly to your course facilitator via email. If you are registered for the course session, you should have received the contact information at the beginning of the course. In addition to your write-up, you may also ask the facilitator to log into your Cloud Environment to further examine your security model.
Note About Customer Data:
Absolutely NO customer data will be shared outside of the Student / Facilitator relationship. The facilitator will never ask a student to share proprietary information with the class. Anything shared with the facilitator as proof of work will be destroyed at the end of the course. If however, you work on a generic project and wish to share it with other users on the community, OSIsoft can help facilitate that. This will be completely at your discretion and OSIsoft would take no legal responsibility.
Note about Original Work:
Please remember that no extensions will be given for the final project. Your submission must be your own work, and not copied from another student, course videos, ebook or online resources. No credit would be given for plagiarized work, partially completed work, and no refunds would be given for failed projects.