rygg

My feedback

  1. 3 votes
    Sign in Sign in with OSIsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  PI Developer Technologies » PI Web API  ·  Flag idea as inappropriate…  ·  Admin →

    This is an issue we definitely need to address for both the reasons you suggested. We should be able to add and remove attributes while a channel is open. We also need a mechanism for signing up for large numbers of WebIds when the list would be too long for a URL.

    rygg supported this idea  · 
  2. 2 votes
    Sign in Sign in with OSIsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  PI Developer Technologies » PI Web API  ·  Flag idea as inappropriate…  ·  Admin →
    rygg shared this idea  · 
  3. 9 votes
    Sign in Sign in with OSIsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  PI Server » Analytics & Calculations  ·  Flag idea as inappropriate…  ·  Admin →
    rygg supported this idea  · 
  4. 62 votes
    Sign in Sign in with OSIsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  PI Vision » Look & Feel / Styling  ·  Flag idea as inappropriate…  ·  Admin →
    rygg supported this idea  · 
  5. 8 votes
    Sign in Sign in with OSIsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  PI Vision » Manual Data Entry  ·  Flag idea as inappropriate…  ·  Admin →
    rygg supported this idea  · 
  6. 1 vote
    Sign in Sign in with OSIsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  PI Developer Technologies » PI Web API  ·  Flag idea as inappropriate…  ·  Admin →
    rygg commented  · 

    This limitation exist in the Mozilla websocket specification that all modern web browsers use. Other frameworks (e.g. .NET) support websockets authenticated with Bearer. You can get around the Mozilla websocket limitation by using a web proxy with header rewriting capabilities (e.g. nginx). You can then open the websocket from the browser and use the "Sec-WebSocket-Protocol" header with value "access_token {jwt}​". The web proxy should then append a header for Authorize Bearer {jwt} and remove the "Sec-WebSocket-Protocol" header before passing the request to PIWebAPI. It requires some configuration, but will help you out if you really need this authentication option.

  7. 11 votes
    Sign in Sign in with OSIsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  PI Server » Security  ·  Flag idea as inappropriate…  ·  Admin →
    rygg commented  · 

    Very good proposal. May I suggest building on today's mapping of Active Directory objects (users and/or security groups) to PI+AF Identities by extending with the possibility to map token claims to PI+AF Identities. This would maintain backwards compatibility as well as supporting the new feature request.

    rygg supported this idea  · 
  8. 10 votes
    Sign in Sign in with OSIsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  PI Server » Security  ·  Flag idea as inappropriate…  ·  Admin →
    rygg commented  · 
  9. 33 votes
    Sign in Sign in with OSIsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  PI Server » Security  ·  Flag idea as inappropriate…  ·  Admin →
    rygg supported this idea  · 

Feedback and Knowledge Base

Posted ideas will have one of the following statuses.
Full definition of these statuses can be found on the Home Page.
No status
NEEDS MORE DISCUSSION
RESEARCHING/EVALUATING
DECLINED
PLANNED
STARTED/IN DEVELOPMENT
IN BETA
COMPLETED