?
Solved

How to make a OPC Server "wide open"

Posted on 2009-05-14
3
Medium Priority
?
659 Views
Last Modified: 2013-12-04
I have a environment where security of OPC provided data is not really of concern. One station should read some data via OPC from another PC.

To simplify things with user accounts, domains, and all that other nasty security stuff, I like to make the OPC server component running on the "server" side as wide open as possible - means everybody with a windows machine who is able to ping that server should be able to read those provided data values with an appropriate client software.

Think of it as temperature and stocked amount of the coke vending machine - interesting to all, but not of security concern.

What do I need to do to rip such a security hole into the server ?
0
Comment
Question by:frankhelk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 2

Accepted Solution

by:
sfrancy earned 750 total points
ID: 24434778
You can set your default DCOM permissions to add "Everyone" for both the launch and access permissioins.  Everyone does not mean anyone though.  This will work if the user can authenticate against your OPC server, meaning that user account must be recognized by the server.  If everything is in a domain, then you won't have a problem.  If you are using workgroups, then the user accounts of your clients must also exist on your server with the same passwords.

It is usually good to start this way (wide open), but after you have things working, you should refine your security to only the users who need access.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
In this post we will be converting StringData saved within a text file into a hash table. This can be further used in a PowerShell script for replacing settings that are dynamic in nature from environment to environment.
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question