markshannon

How can I secure PI SMT to allow use of parts of SMT by user roles?

Discussion created by markshannon on Apr 19, 2013
Latest reply on Apr 23, 2013 by RJKSolutions

I have deployed PI SMT to 3 different users who like and use only a couple of features of PI SMT. My dilemna is that I don't want SMT in the hands of users because of its inherent power, however the user who have SMT find the archive data retrieval particularly useful and one of the other users likes the ability to modify tag properties thru SMT's point builder. Does anyone know of a way to deliver archive data retrieval effectively thru anything other than SMT? Does anyone know if a way to allow modifications to tag properties by using something other than SMT?

 

Thanks

 

 

Outcomes