Explore core components that ensure scalability and performance for multi-site, multi-national industrial companies.
Industrial data use cases reach across IT, OT, and line of business users. An enterprise scope requires enterprise-tier security, user management, auditing, and project management to achieve a successful Industrial DataOps solution at scale. Administration capabilities ensure that the right data reaches the right people securely, while creating detailed audit trails and adhering to CI/CD deployment models and management.
|
Security
Exchange data using the built-in security of connection protocols. By identifying outputs by connection, administrators can implement higher-level management and security than typical pub/sub broker architectures and open, unmanaged API access. Authenticate users and their roles through third party identity providers with Security Assertion Markup Language (SAML).
Permissions
Create unique usernames and passwords for each user. Assign a user to a role with a pre-defined set of permission claims or assign a user their own unique permission claims. Use Active Directory to manage authentication, authorization of users, and application settings. Create and maintain certificates in the hub configuration to authenticate and secure data transfer with other systems.
Central Management
Connect multiple hubs to a single host that acts as the central hub. Once connected, administrators can log in to the central hub and easily switch between hubs to configure and monitor individual hub activity and compare configurations for differences. Administrators can also synchronize models, connections, or complete projects between hubs.
Flexible Configuration
Import and export JSON-based configuration files between Intelligence Hub and third-party sources within the browser-based configuration UI. Share configurations at the connection, condition, model, instance, flow, pipeline, and tag level. Dynamically drive template definitions from third-party sources and uniquely trigger flows for each asset, enabling replication of common datasets across assets without needing to templatize in the Intelligence Hub.
Auditing
Enable audit logging to allow all configuration creations, modifications, or deletions to be logged to the event log as AUDIT type events. View all log events through the configuration and filter by type, source, or message text. Automatically back up the runtime’s configuration file to a backup directory at a specified frequency and maintain a specified maximum number of these files.
High Availability
Deploy redundant Intelligence Hubs for critical data and pair the hubs as a primary and secondary. A secondary hub will be ready in a warm state ready to enable flows when it detects the primary is no longer responding.
Project Management
The Intelligence Hub includes tags to define ad hoc collections of items in the configuration. These tags can easily be used to identify configuration related to a use case or a section of the factory or to limit permissions to specific people. The tags enable easy grouping to filter the UI, synchronize across hubs, and grant permissions within a hub.
HighByte Intelligence Hub allows administrators to:
✓ Switch between multi-hub and single-hub views.
✓ Synchronize models, connections, or complete projects between hubs.
✓ Enable tag-based grouping to filter the UI, synchronize across hubs, and grant permissions.
✓ Identify outputs by connection to implement high-level security.
✓ Use SAML to authenticate users and their roles through third party identity providers.
✓ Assign users to roles with predefined and/or unique permissions claims.
✓ Manage authentication, authorization of users, and application settings.
✓ Enable auditing by logging and labeling configuration creations, modifications, or deletions.
✓ Automatically back up the runtime configuration file to a backup directory.
✓ Deploy redundant Intelligence Hubs to minimize interruptions.
✓ Replicate third-party-sourced templates to similar assets
✓ Export and import full or partial project configurations defined by either the Intelligence Hub or external sourcess
✓ Synchronize models, connections, or complete projects between hubs.
✓ Enable tag-based grouping to filter the UI, synchronize across hubs, and grant permissions.
✓ Identify outputs by connection to implement high-level security.
✓ Use SAML to authenticate users and their roles through third party identity providers.
✓ Assign users to roles with predefined and/or unique permissions claims.
✓ Manage authentication, authorization of users, and application settings.
✓ Enable auditing by logging and labeling configuration creations, modifications, or deletions.
✓ Automatically back up the runtime configuration file to a backup directory.
✓ Deploy redundant Intelligence Hubs to minimize interruptions.
✓ Replicate third-party-sourced templates to similar assets
✓ Export and import full or partial project configurations defined by either the Intelligence Hub or external sourcess
Ready to see more?
Curious to learn more and see a live demo of HighByte Intelligence Hub? In this demo, we will show you how to deploy HighByte Intelligence Hub at the Edge to access, model, transform, and securely flow industrial data to and from your IT applications without writing or maintaining code.