Skip to main content

PI Connector

What is the PI Connector?

The PI Connector is our backend data management service between a user’s AVEVA PI System and Irys. The PI connector is a single installation package that is installed on a customer's machine with access to their PI Server (typically within the same network). The PI Connector creates a single outbound connection to Irys Hub to connect a customer's PI System to their Irys tennant.

How to Install the PI Connector?

The PI Connector is a simple .msi file which takes all of 1 second to install. Once installed, users need to open Services and start the "Irys PI Connection Service". This Windows service can be run from the local system and will be set to Automatic startup type by default.

System Requirements

The table below outlines the critical requirements needed to install the PI Connector:

RequirementDescription
AF SDKThe PI Connector uses the AF SDK to access the PI System, the AF SDK comes included with the PI System Explorer.
.NET Framework 4.6Required to use the AF SDK. The AF SDK from Aveva does not currently support .NET Core, and only supports older versions of .NET, support for .NET 8 is planned for the second half of 2024 according to AVEVA PI System Feedback Portal.
Windows ServerThe PI Connector has been tested with Windows Server 2022, contact us for for info on other versions of Windows Server.

Configuration Requirements

The installation and configuration of the PI Connector are streamlined to ensure ease of use while maintaining robust security standards. The process involves:

  1. Outbound Internet Access - Ensure that the system can establish outbound connections over TCP port 443. This secure connection requires no firewall adjustments.
  2. Security Configuration - The PI Connector needs to be configured to authenticate with your Irys tennant.

How is the data secured?

Security is a paramount concern, especially when handling sensitive operational data. The PI Connector adopts industry-leading practices to safeguard data transmission:

  1. Outbound-Only Connection - By establishing an outbound connection to the Irys Hub via a websocket over SSL/TLS, the need for opening inbound ports on the firewall is eliminated, significantly reducing potential attack vectors.
  2. OAuth Authentication - Utilizes OAuth 2.0 for client-client credential flow, ensuring that only authorized devices can communicate with Irys Hub. This authentication mechanism is an industry-standard protocol, offering robust security features for the protection of sensitive operational data.
  3. Data Encryption - All data transmitted between the PI System and Irys Hub is encrypted, ensuring that sensitive information remains confidential and secure from unauthorized access.