Annex A (informative): OPC COM DA to UA Mapping ToC Previous

A.2 Security Considerations ToC Previous Next

COM DA relies on the Microsoft COM security infrastructure and does not specify any security parameters such as user identity. The developer of UA Wrapper and Proxy therefore has to consider the mapping of security aspects.

The COM UA Wrapper for instance may accept any Username/password and then try to impersonate this user by calling proper Windows services before connecting to the COM DA Server.

Previous Next