Skip to Main Content
AVEVA™ PI System™ Feedback Portal

Welcome to our new feedback site!


We created this site to hear your enhancement ideas, suggestions and feedback about AVEVA products and services. All of the feedback you share here is monitored and reviewed by the AVEVA product managers.

To start, take a look at the ideas in the list below and VOTE for your favorite ideas submitted by other users. POST your own idea if it hasn’t been suggested yet. Include COMMENTS and share relevant business case details that will help our product team get more information on the suggestion. Please note that your ideas and comments are visible to all other users.


This page is for feedback specifically for AVEVA PI System. For links to our other feedback portals, please see the tab RESOURCES below.

Status No Status
Categories Security
Created by Guest
Created on Aug 20, 2022

Ability to manage non-impersonated linked tables without PI AF Server Admin privilegies

PI AF Admin would like grant permissions for users that are not level server admins to create and edit non-impersonated linked tables. Currently this only allowed for AF server admins or using impersonated linked tables. User guide: https://livelibrary.osisoft.com/LiveLibrary/content/en/server-v12/GUID-B6374C40-8922-40CC-8E76-45CC646DA03F https://livelibrary.osisoft.com/LiveLibrary/content/en/server-v12/GUID-D1BDFD1B-8720-4CAD-8A06-0FCE958664BC
  • Attach files
  • Guest
    Reply
    |
    Aug 20, 2022
    In the current implementation, AFTables are library objects, meaning all users have access. If we allow users who are not admins to create and edit linked tables, then that means other users of the AF system would be able to access these tables. Is that your use case?
  • Sean-PFS
    Reply
    |
    Aug 20, 2022
    Stephen Kwan, can you explain your comment a little more? There are security settings for tables and table connections that don't seem to do anything. I want to be able to give Engineers the rights to create and modify tables, and not give them full admin rights to the whole of AF as it is now. Table Connections Administrators:A(r,w,rd,wd,d,x,a,s,so,an)|Engineers:A(r,w,rd,wd,d,x,a,s,so,an)|World:A(r,rd)|Asset Analytics:A(r,w,rd,wd,x,an)|Asset Analytics Recalculation:A(x)|Notifications:A(r,w,rd,wd,an)|PIVision:A(r,w,rd,wd,a,s,so)|PIEFGen:A(r,w,rd,wd,d,x,a,s,so,an) Tables Administrators:A(r,w,rd,wd,d,x,a,s,so,an)|Engineers:A(r,w,rd,wd,d,x,a,s,so,an)|World:A(r,rd)|Asset Analytics:A(r,w,rd,wd,x,an)|Asset Analytics Recalculation:A(x)|Notifications:A(r,w,rd,wd,an)|PIVision:A(r,w,rd,wd,a,s,so)|PIEFGen:A(r,w,rd,wd,d,x,a,s,so,an)
  • Guest
    Reply
    |
    Aug 20, 2022
    Seems there should be a better way than just to open up the system by giving admin rights. This can create a lot of overhead to constantly have to go in and out to modify users rights so they can preform tasks for their role and then remove said rights to ensure that the whole system is unnecessarily exposed