PI Security Architecture
PI System security is built on a layered model that controls access at multiple levels: server connection, data point access, and application-level permissions.
Security Layers
User / Application
│
â–¼
PI Identity (Who are you?)
│
â–¼
PI Mapping (Map Windows user → PI Identity)
│
â–¼
PI Point Security (What data can you access?)
│
â–¼
PI Data Archive (Enforce access control)PI Identities
PI Identities are named security principals within the PI System:
| Identity | Purpose | Typical Permissions |
|---|---|---|
| PIWorld | Anonymous/public access | Read-only, limited tags |
| PIOperators | Operations staff | Read all process data |
| PIEngineers | Engineering team | Read/write, create tags |
| PIAdmins | Administrators | Full access |
| PIInterfaces | Interface services | Write to assigned tags |
PI Mappings
Mappings link Windows users/groups to PI Identities:
Active Directory Group: DOMAIN\PI_Operators
↓ Mapped to
PI Identity: PIOperators
↓ Has permissions
PI Point Security: Read access to all process tagsCreating a PI Mapping (SMT)
1. Open PI System Management Tools (SMT)
2. Navigate to Security > Mappings & Trusts > Mappings
3. Click Add → Select Windows group
4. Assign PI Identity
5. Set expiration (optional)
6. Click OK and verify
PI Point Security
Each PI point has individual security settings:
PI Point: REACTOR_TEMP_001
├── Read: PIWorld (all users can read)
├── Write: PIInterfaces (only interface can write)
├── Change Security: PIAdmins (only admins can modify)
└── Delete: PIAdminsActive Directory Best Practices
1. Use AD Groups, not individual users — easier to manage
2. Principle of least privilege — grant minimum required access
3. Separate service accounts — dedicated accounts for interfaces
4. Regular access reviews — audit quarterly
5. Disable PI Trusts — use Mappings instead (more secure)
PI Vision Security
PI Vision inherits PI System security but adds display-level controls:
- Display permissions: Control who can view/edit displays
- Server-side rendering: Data never exposed to unauthorized users
- HTTPS required: Always use SSL/TLS in production
- Kerberos authentication: Single sign-on with AD