4 OPC UA security architecture ToC Previous Next

4.11 User Authorization ToC Previous Next

OPC UA provides user authorization based on the authenticated user (see 4.9). OPC UA Applications may determine in their own way what data is accessible and what operations are authorized or they may use Roles (see 4.12). Profiles exist to indicate the support of user credentials to restrict or control access to the address space.

Previous Next