Skip to main content

Enterprise Administration in HighByte Intelligence Hub

Explore core components that ensure scalability and performance for multi-site, multi-national industrial companies.

HighByte Intelligence Hub Enterprise Administration

Apply data governance best practices and prepare for enterprise scale.

Industrial data use cases reach across IT, OT, and line of business users. An enterprise scope requires enterprise-tier security, user management, auditing, and project management to achieve a successful Industrial DataOps solution at scale. Administration capabilities ensure that the right data reaches the right people securely, while creating detailed audit trails and adhering to CI/CD deployment models and management.

Security

Exchange data using the built-in security of connection protocols. By identifying outputs by connection, administrators can implement higher-level management and security than typical pub/sub-broker architectures and open, unmanaged API access. Authenticate users and their roles through third-party identity providers with Security Assertion Markup Language (SAML). Securely move project configurations across environments with different connection credentials using external secrets support and the dedicated configuration construct for secure secret referencing.

Flexible Configuration

Import and export JSON-based configuration files between Intelligence Hub and third-party sources within the browser-based configuration UI. Share configurations at the connection, condition, model, instance, flow, pipeline, and tag level. Dynamically drive template definitions from third-party sources and uniquely trigger flows for each asset, enabling replication of common datasets across assets without needing to templatize in the Intelligence Hub. 

Premissions

Create unique usernames and passwords for each user. Assign a user to a role with a pre-defined set of permission claims or assign a user their own unique permission claims. Use Active Directory to manage authentication, authorization of users, and application settings. Create and maintain certificates in the hub configuration to authenticate and secure data transfer with other systems.

Central Management

Connect multiple hubs to a single host that acts as the central hub. Once connected, administrators can log in to the central hub and easily switch between hubs to configure and monitor individual hub activity and compare configurations for differences. Administrators can also synchronize models, connections, or complete projects between hubs. 

Auditing

Enable audit logging to allow all configuration creations, modifications, or deletions to be logged to the event log as AUDIT type events. View all log events through the configuration and filter by type, source, or message text. Automatically back up the runtime’s configuration file to a backup directory at a specified frequency and maintain a specified maximum number of these files.

High Availability

Deploy redundant Intelligence Hubs for critical data and pair the hubs as a primary and secondary. A secondary hub will be ready in a warm state ready to enable flows when it detects the primary is no longer responding.

Project Management

The Intelligence Hub includes tags to define ad hoc collections of items in the configuration. These tags can easily be used to identify configuration related to a use case or a section of the factory or to limit permissions to specific people. The tags enable easy grouping to filter the UI, synchronize across hubs, and grant permissions within a hub.

ADMINISTRATION FEATURES AND FUNCTIONALITY

HighByte Intelligence Hub allows administrators to:

Check mark

Switch between multi-hub and single-hub views

Check mark

Synchronize models, connections, or complete projects between hubs

Check mark

Enable tag-based grouping to filter the UI, synchronize across hubs, and grant permissions

Check mark

Identify outputs by connection to implement high-level security

Check mark

Use SAML to authenticate users and their roles through third party identity providers

Check mark

Assign users to roles with predefined and/or unique permissions claims

Check mark

Replicate third-party-sourced templates to similar assets

Check mark

Manage authentication, authorization of users, and application settings

Check mark

Enable auditing by logging and labeling configuration creations, modifications, or deletions

Check mark

Automatically back up the runtime configuration file to a backup directory

Check mark

Deploy redundant Intelligence Hubs to minimize interruptions

Check mark

Export and import full or partial project configurations defined by either the Intelligence Hub or external sources

Ready to try HighByte Intelligence Hub?

Join the free trial program to get hands-on access to all the features and functionality within HighByte Intelligence Hub and start testing the software in your unique environment.