Skip to Main Content
AVEVA Product Feedback


Status No Status
Categories Security
Created by Guest
Created on Aug 20, 2022

Ability to manage non-impersonated linked tables without PI AF Server Admin privilegies

PI AF Admin would like grant permissions for users that are not level server admins to create and edit non-impersonated linked tables. Currently this only allowed for AF server admins or using impersonated linked tables. User guide: https://livelibrary.osisoft.com/LiveLibrary/content/en/server-v12/GUID-B6374C40-8922-40CC-8E76-45CC646DA03F https://livelibrary.osisoft.com/LiveLibrary/content/en/server-v12/GUID-D1BDFD1B-8720-4CAD-8A06-0FCE958664BC
  • Attach files
  • Guest
    Reply
    |
    Aug 20, 2022
    In the current implementation, AFTables are library objects, meaning all users have access. If we allow users who are not admins to create and edit linked tables, then that means other users of the AF system would be able to access these tables. Is that your use case?
  • Guest
    Reply
    |
    Aug 20, 2022
    Stephen Kwan, can you explain your comment a little more? There are security settings for tables and table connections that don't seem to do anything. I want to be able to give Engineers the rights to create and modify tables, and not give them full admin rights to the whole of AF as it is now. Table Connections Administrators:A(r,w,rd,wd,d,x,a,s,so,an)|Engineers:A(r,w,rd,wd,d,x,a,s,so,an)|World:A(r,rd)|Asset Analytics:A(r,w,rd,wd,x,an)|Asset Analytics Recalculation:A(x)|Notifications:A(r,w,rd,wd,an)|PIVision:A(r,w,rd,wd,a,s,so)|PIEFGen:A(r,w,rd,wd,d,x,a,s,so,an) Tables Administrators:A(r,w,rd,wd,d,x,a,s,so,an)|Engineers:A(r,w,rd,wd,d,x,a,s,so,an)|World:A(r,rd)|Asset Analytics:A(r,w,rd,wd,x,an)|Asset Analytics Recalculation:A(x)|Notifications:A(r,w,rd,wd,an)|PIVision:A(r,w,rd,wd,a,s,so)|PIEFGen:A(r,w,rd,wd,d,x,a,s,so,an)
  • Guest
    Reply
    |
    Aug 20, 2022
    Seems there should be a better way than just to open up the system by giving admin rights. This can create a lot of overhead to constantly have to go in and out to modify users rights so they can preform tasks for their role and then remove said rights to ensure that the whole system is unnecessarily exposed