Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

How to make a OPC Server "wide open"

Posted on 2009-05-14
3
653 Views
Last Modified: 2013-12-04
I have a environment where security of OPC provided data is not really of concern. One station should read some data via OPC from another PC.

To simplify things with user accounts, domains, and all that other nasty security stuff, I like to make the OPC server component running on the "server" side as wide open as possible - means everybody with a windows machine who is able to ping that server should be able to read those provided data values with an appropriate client software.

Think of it as temperature and stocked amount of the coke vending machine - interesting to all, but not of security concern.

What do I need to do to rip such a security hole into the server ?
0
Comment
Question by:frankhelk
3 Comments
 
LVL 2

Accepted Solution

by:
sfrancy earned 250 total points
ID: 24434778
You can set your default DCOM permissions to add "Everyone" for both the launch and access permissioins.  Everyone does not mean anyone though.  This will work if the user can authenticate against your OPC server, meaning that user account must be recognized by the server.  If everything is in a domain, then you won't have a problem.  If you are using workgroups, then the user accounts of your clients must also exist on your server with the same passwords.

It is usually good to start this way (wide open), but after you have things working, you should refine your security to only the users who need access.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
An article on effective troubleshooting
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question