OPC UA settings
OPC UA settings are accessed from the Application Explorer by selecting <Project>.Communication.Data acquisition.OPC UA and choosing the Settings command from the task list.
Settings | Description |
Client connection | |
---|---|
Ignore overridable client connection errors | Allows to ignore connection errors originating from the PcVue driver. |
Secure channel lifetime |
Duration in which the key pair exchanged during secure channel establishment are valid. Renewal starts after 75% of the lifetime elapsed to assure new keys are obtained when change occurs. Range: 5 min..1 hour |
Timeouts | |
Session timeout |
Timeout for the sessions. The driver ensures that the session does not timeout unless a disconnection is to be performed. Range: 30 sec..1 hour Requested parameter: The server might send back a revised value meeting it owns constraints. |
Connect timeout |
Timeout for the connection calls. Range: 0..1 hour |
Publish timeout |
Time out for the publish request calls. PcVue provide one or more request to the server (that queues them) for it to transmit back as notification. If no notification after a period of MaxKeepAliveCount * PublishingInterval, then a KeepAlive message is sent, thus requests must not timeout before this interval elapsed. Range: 0..1 hour |
Service calls timeout |
Timeout for service calls. Range: 10 sec..1 hour |
Server state watch timeout |
Timeout for watchdog checks calls. After one unsuccessful call the value is doubled for the next call. Range: 0..1 hour |
Reconnection | |
Server state watch period |
Background polling period of the server state. It is also the period at which a reconnection is attempted. Range: 1 sec..1 hour |
Limits | |
Restrict maximum operations per service call |
Maximum number of operations used in a service call. The driver manages requests splitting if needed. In practice, the server has its own limitations to what it can supports too. A value of 0 indicates no limitation (splitting disabled). Range: 0..4294967295 |
Certificates | |
Accept invalid server certificate | Allows to accept a server certificate identified as invalid. |
Accept new server certificate | Allows to accept a server certificate provided through communication with the server than differs from the one specifically accepted initially. |
Ignore server certificate verification errors | Allows to ignore errors when verifying server certificates. |
Checks | |
Ignore certificate error from validity period |
If set, server certificate validation errors due to bad validity period (BadCertificateTimeInvalid) are ignored. |
Ignore issuer certificate error from validity period | If set, server certificate validation errors due to bad issuer validity period (BadCertificateIssuerTimeInvalid) are ignored. |
Ignore certificate error from unknown revocation | If set, server certificate validation errors due to unknown revocation (BadCertificateRevocationUnknown) are ignored. |
Ignore issuer certificate error from unknown revocation | If set, server certificate validation errors due to unknown issuer revocation (BadCertificateIssuerRevocationUnknown) are ignored. |
Ignore certificate error from invalid hostname | If set, server certificate validation errors due to a mismatch between the declared hostname and the actual one are ignored. |
Disable password encryption check | If set, no verification is performed for proper encryption of a password provided in an identity token. |
Disable application URI check | If set, no verification is performed to ensure that the ApplicationUri in the server certificate matches the ApplicationUri the server uses in its EndpointDescription. |
Disable nonce length check | If set, no verification is performed to ensure that the ServerNonce has the correct length of minimum 32 bytes. |
Disable trusted certificate requirement for user token | If set, the certificate used to encrypt a password does not need to be trusted. |
Disable session id check | If set, no verification is performed to ensure the server returned a non-null SessionId. |
Disable certificate usage check |
If set, no verification is performed to ensure the certificate structure and key usage are adequate. Certificate fields: SubjectAlternativeName, KeyUsage, ExtendedKeyUsage. |