The OPC UA Server component allows the dataFEED edgeConnector modules to create OPC UA Server endpoints to be used by external OPC UA Clients for accessing the PLC data.
To enable or disable the OPC UA Server component navigate to Connectivity -> OPC UA -> OPC UA Server Application Settings and change the status of the component by checking/unchecking the Activate/Deactivate OPC UA Server checkbox.
Information about all configured OPC UA Server endpoints is centralized and accessible by navigating to Connectivity -> OPC UA -> OPC UA Server Application Settings -> OPC UA Server Endpoints.
The page consists of two areas:
In the OPC UA Server Endpoints table, all configured OPC UA Server endpoints are displayed, each row representing one connection. The information in the table can be sorted by clicking the appropriate column header.
Column Name | Information Details |
---|---|
Endpoint Name | User defined endpoint name |
Endpoint URL | Endpoint URL based on: |
- user defined transport protocol | |
(opc.tcp or http) | |
- fully qualified domain name of the computer running | |
the dataFEED edgeConnector module | |
- user defined port | |
- user defined URL path | |
Endpoint Description | User defined endpoint description text |
This field can be used to include additional | |
information or remarks about the endpoint. | |
URLs | List of all possible URLs which can be used to access |
the configured endpoint | |
Enabled | Configuration status of the OPC UA Server endpoint |
See the table below for more details. | |
Endpoint Status | Icon | Details |
---|---|---|
Disabled | The endpoint is configured as Disabled, | |
therefore it is not accessible by any OPC UA Client. | ||
Clicking the current configuration state icon triggers a state toggle: Disabled -> Enabled | ||
Enabled | The endpoint is configured as Enabled, it is accessible and able to accept incoming connection requests if other environmental conditions are met (e.g. license slots are available). | |
Clicking the current configuration status icon triggers a status toggle: Enabled -> Disabled | ||
Access Protection temporarily or permanently disabled | The endpoint is configured as Enabled, but it has been disabled by the Disabled by the access protection feature because the configured access protection restrictions were met. | |
By checking the access protection applied settings it can be found if the endpoint is temporarily or permanently disabled. | ||
Clicking the current configuration status icon triggers a status toggle resetting the current access protection status and re-enabling the endpoint | ||
Access Protection temporarily or permanently disabled -> Enabled | ||
Access Protection IPs or certificated prevented authentication | The endpoint is configured as Enabled, it is accessible and able to accept incoming connection requests, but it rejects some connections attempts based on IPs or certificates as resulted from the access protection configuration. | |
This state can be manually reset by accessing the access protection settings and disabling/enabling the authentication restrictions for remote IPs and certificates. | ||
Clicking the current configuration status icon triggers a status toggle, but it shall not reset the access protection status | ||
Access protection IPs or certificates prevented authentication -> Disabled |
From the title bar of the OPC UA Server Endpoints table a new endpoint can be added or an exiting endpoint can be edited or deleted:
When adding a new OPC UA Server endpoint or editing an existing OPC UA Server endpoint from the OPC UA Server Endpoints page the endpoint creation page is loaded which provides a simple and intuitive interface for configuring a new or editing an existing OPC UA Server endpoint.
The configuration parameters are described in the table below:
Parameter Name | Default Value | Description |
---|---|---|
Endpoint Name | <empty> | Connection name as it shows up in the OPC UA Client connection overview page |
This name shall also be used by the OPC Client when connecting to an external OPC UA Server | ||
Note | ||
The following characters are not supported in the Endpoint Name field: # ^ < > / $ | ||
Enabled | Enabled | Either enables (checked) or disables (unchecked) the currently configured OPC UA Server endpoint. |
OPC UA Endpoint Protocol | TCP | The OPC UA Server endpoint transport protocol is configurable by selecting the appropriate radio button. |
OPC UA Endpoint Hostname | Hostname | Pre-populated, read-only field defining the computer’s hostname. |
OPC UA Endpoint Port | 4810 | OPC UA Server port number |
Populated with an available port, not assigned to an existing endpoint, starting with port 4180. | ||
Note | ||
Ports lower than 1024 are not allowed. The OPC UA Endpoint Port field is automatically validated. | ||
OPC UA Endpoint Path | endpoint1 | User editable OPC UA Server endpoint URL path |
Pre-populated with a string in the form endpoint[index] where index may change if the path already exists | ||
Endpoint URL | opc.tcp://[hostname]:[port]/[path] | Configured OPC UA Server endpoint URL based on the selected transport protocol, port number, URL path as well as the existing hostname |
Authentication Settings | All | Authentication method supported by the endpoint |
Note: | ||
Supported settings: Anonymous, Username & Password and Certificate | ||
Message Security Mode | All | Endpoint message security mode (whether signing or encryption is used when exchanging messages) |
Note: | ||
Supported message security modes: None, Sign, SignAndEncrypt | ||
Security Policy | All | Endpoint security policy (encryption algorithm applied to the messages) |
Note | ||
Supported security policies: None, Basic256, Basic256Sha256, Basic128Rsa15, Aes128_Sha256_RsaOaep and Aes256_Sha256_RsaPss | ||
Max Number of Concurrent Connections | 10 | Maximum number of concurrent connections from external OPC UA Clients supported by endpoint |
Access Rights | All | Configuration of endpoint’s supported services |
Enable the service by checking the appropriate service checkbox. | ||
*Note | ||
Supported services: Browse, Read, Write, Subscribe, Method | ||
Endpoint Description | <empty> | User defined endpoint description text |
Can be used to include additional information or remarks about the endpoint |
The certificates page provides an interface for managing the SSL certificates stored in the endpoint’s PKI store.
Shows the certificate used to identify the dataFEED edgeConnector endpoint application instance. This certificate is uniquely created for each OPC UA Server endpoint.
Only one certificate should be visible in the own certificate area. This is the certificate which is used by the running OPC UA Server endpoint to identify itself.
Several operations are accessible using the buttons placed top right:
Reuse Application Certificate
button
Provides the possibility to reuse a certificate which is already in use to
identify a different configured OPC UA Server endpoint
Clicking the button
brings up a window which lists the available OPC UA Server endpoints. To reuse
the certificate of an existing endpoint, select the endpoint in the list and
click the Reuse Certificate button.
Generate Application Certificate button
Creates a new replacement certificate for the current own application
certificate
Upload Application Certificate button
Provides a simple way to replace the currently used application certificate
with an already existing certificate
The upload certificate windows opens by clicking the Upload certificate
button. In this window the new certificate file can be selected by
pressing the Choose File button.
If the certificate requires a password, the corresponding password input field has to be used, otherwise the field should be left empty.
Download Application Certificate button
Provides a way to download the current own certificate
Allows manipulation and information retrieval on the current OPC UA Server endpoint’s trusted certificates. All remote OPC UA Client application instances whose certificates are listed in this view have a trust relationship established with the current endpoint.
Several operations are accessible using the buttons placed on top right:
Upload Certificate button
Provides a way to add a pre-owned certificate, locally stored, to the Trusted
Certificates folder. After clicking the Upload Certificate button a new
view opens, where the new certificate file shall be selected by pressing the
Choose file button. To finalize the action press the
Upload Certificate button.
Uploading a trusted certificate is required when an external OPC UA Client is expected to establish a secure connection to an existing OPC UA Server endpoint. In this case the external OPC UA Client’s certificate needs to be uploaded in the OPC UA Server endpoint trusted certificates section. An alternative solution for the above scenario is to entrust an already rejected certificate.
Delete Certificate button
Deletes the currently selected certificate from the trusted certificates
folder. After deletion the trust relationship with the deleted certificate
owner application will be invalidated.
All remote OPC UA application instance certificates whose connection establishment to the current OPC UA endpoint has failed due to trust relationship conditions are listed in the Rejected Certificates window.
The dataFEED edgeConnector does not automatically trust remote OPC UA application instance certificates therefore secured connection attempts may result in remote certificates automatically stored in the Rejected Certificates folder.
Several operations are accessible using the buttons placed on top right:
Move to Trusted button
Provides the functionality needed to trust an already rejected OPC UA
application instance by moving its rejected certificate into the
Trusted Certificates folder. Clicking the Move to Trusted button will
move the selected rejected certificate into the Trusted Certificates folder.
The result of this action is visible in the configuration page and the
previously rejected certificate now is visible in the trusted certificates
list. Any previously trust-related failed connection attempts, will
subsequently succeed after moving the certificates to the Trusted Certificates folder.
This is an important manual step required to enable external OPC UA Clients to connect to a secured OPC UA Server endpoint connection.
Delete Certificate button
Deletes the currently selected certificate from the Rejected Certificates
folder.
Information about the selected certificate is available in the certificates properties area.
In this table details about the users assigned to the currently selected endpoint are provided.
Column Name | Information details |
---|---|
Username | Name of the user |
Address Spaces | Address space exposed to the OPC UA Client connection to |
the selected endpoint and authenticated with the current. | |
Certificates | Validity status of the certificates attached to the user or the absence of any certificate |
Possible values are: | |
- Certificates were found and all are fine: | |
- At least one certificate will expire soon: | |
- At least one certificate has already expired: | |
- No certificates are attached to the current user: | |
Enabled | Configuration status of the assignment of the current user to the selected OPC UA Server endpoint |
Possible values are Enabled or Disabled. | |
Clicking the current configuration status icon triggers a status toggle: Enabled -> Disabled; Disabled -> Enabled |
From the title bar of the Endpoint Users - Identities table a new user can be added or an existing user can be edited or deleted:
Any newly created OPC UA Server endpoint requires a user to be assigned before it can be used by external OPC UA Clients.
Adding a new endpoint user or editing an existing endpoint user from the OPC UA Server Endpoints page will load the user creation page. When editing an existing user the Username drop down list is deactivated, and also the creation of new users is disabled.
The User Settings configuration tab allows selecting an already existing user by using the Username drop down list or create a new system user by clicking the Create New User button. The user settings information to be filled in is described in the following table:
Parameter name | Default Value | Details |
---|---|---|
Username | <empty> | The endpoint’s authorized user |
Enabled | True | Enabled/Disabled status of the endpoint’s authorized user |
Once disabled the username cannot be used for authentification while an OPC UA Client establishes a connection to the endpoint. | ||
Max Number of Concurrent Connections | 10 | Maximum allowed number of concurrent OPC UA Client connections to the selected endpoint being authenticated with the username defined in the Username filed |
Address Space | AllConnectionsAddressSpace | Address space exposed to the OPC UA Client connection to the selected endpoint and authenticated with the username defined in the Username field |
Access Rights | All | Services allowed for the username defined in the Username field |