6 Basic security requirements

6.2 User security/Access control

6.2.1 On IMM

On the IMM authentication via user name and password is commonly used.
Online versions of OPC UA specifications and information models.
On the IMM authentication via user name and password is commonly used.