SICAM Gridpass 3

Total Page:16

File Type:pdf, Size:1020Kb

Load more

Open Source Software Table of Contents

12345678A

Overview

SICAM

Enrollment over Secure Transport (EST) SICAM GridPass

GridPass

Workflow Step-by-Step User Management Certificate Management Managing EST

V1.50

Manual

Other Features Glossary

E50417-H8940-C598-A6

NOTE

For your own safety, observe the warnings and safety instructions contained in this document, if available.

i

  • Disclaimer of Liability
  • Copyright

Subject to changes and errors. The information given in this document only contains general descriptions and/or performance features which may not always specifically reflect those described, or which may undergo modification in the course of further development of the products. The requested performance features are binding only when they are expressly agreed upon in the concluded contract.
Copyright © Siemens 2018 – 2020. All rights reserved. The disclosure, duplication, distribution and editing of this document, or utilization and communication of the content are not permitted, unless authorized in writing. All rights, including rights created by patent grant or registration of a utility model or a design, are reserved.

Document version: E50417-H8940-C598-A6.01 Edition: 05.2020

Trademarks

SIPROTEC, DIGSI, SIGRA, SIGUARD, SIMEAS SAFIR, SICAM, and MindSphere are trademarks of Siemens. Any unauthorized use is prohibited.
Version of the product described: V1.50

Open Source Software

The product contains, among other things, Open Source Software developed by third parties. The Open Source Software used in the product and the license agreements concerning this software can be found in the Readme_OSS. These Open Source Software files are protected by copyright. Your compliance with those license conditions will entitle you to use the Open Source Software as foreseen in the relevant license. In the event of conflicts between Siemens license conditions and the Open Source Software license conditions, the Open Source Software conditions shall prevail with respect to the Open Source Software portions of the software. The Open Source Software is licensed royalty-free. Insofar as the applicable Open Source Software License Conditions provide for it you can order the source code of the Open Source Software from your Siemens sales contact – against payment of the shipping and handling charges – for a period of at least 3 years after purchase of the product. We are liable for the product including the Open Source Software contained in it pursuant to the license conditions applicable to the product. Any liability for the Open Source Software beyond the program flow intended for the product is explicitly excluded. Furthermore any liability for defects resulting from modifications to the Open Source Software by you or third parties is excluded. We do not provide any technical support for the product if it has been modified.

  • SICAM, GridPass, Manual
  • 3

E50417-H8940-C598-A6, Edition 05.2020

Table of Contents

Open Source Software..................................................................................................................................3 Overview...................................................................................................................................................... 6

1

1.1 1.2 1.3 1.4
General...............................................................................................................................7 Public Key Infrastructure (PKI)............................................................................................. 7 Certification Authority (CA)................................................................................................. 7 PKI Workflow...................................................................................................................... 8

23

Enrollment over Secure Transport (EST).................................................................................................... 10 2.1 2.2 2.3
Function........................................................................................................................... 11 Authentication..................................................................................................................11 CRL................................................................................................................................... 12

SICAM GridPass...........................................................................................................................................13 3.1 3.2 3.3 3.4
Overview.......................................................................................................................... 14 Workflow.......................................................................................................................... 14 Integration........................................................................................................................15 Operating Overview.......................................................................................................... 16

4

Workflow Step-by-Step...............................................................................................................................18

  • 4.1
  • Setup................................................................................................................................19

Preconditions.............................................................................................................. 19 Description..................................................................................................................19 Setup.......................................................................................................................... 19 Licensing Description...................................................................................................26 Licensing.....................................................................................................................26
Login Procedure................................................................................................................30
Initial Login................................................................................................................. 30
Create Operational CA.......................................................................................................35 Create a Server Certificate for Web UI and EST Server.........................................................40 Download and Trust the CA Certificate.............................................................................. 45 Set the Created Server Certificate as SICAM GridPass Web-Server Certificate.......................53 Configure Centralized Syslog Logging................................................................................55
4.1.1 4.1.2 4.1.3 4.1.4 4.1.5 4.2 4.2.1 4.3 4.4 4.5 4.6 4.7

5

User Management...................................................................................................................................... 56

  • 5.1
  • Introduction......................................................................................................................57

Overview.....................................................................................................................57
User Administration.......................................................................................................... 57
Local User Administration............................................................................................ 57 Logout........................................................................................................................ 60
5.1.1 5.2 5.2.1 5.2.2

  • 4
  • SICAM, GridPass, Manual

E50417-H8940-C598-A6, Edition 05.2020
Table of Contents

  • 5.2.3
  • Initial Login with a Local Account.................................................................................61

6

Certificate Management.............................................................................................................................63

  • 6.1
  • Overview of Import, Export, and Creation of Certificates.................................................... 64

Remote Requests.............................................................................................................. 65 Local Requests.................................................................................................................. 66
Create a Certificate...................................................................................................... 66 Import a CSR and Issue a Certificate............................................................................. 70 Import a Certificate with CA Chain............................................................................... 73 Export a Certificate...................................................................................................... 76 Revoke a Certificate..................................................................................................... 78
Certification Authorities.................................................................................................... 79
Create a Root-CA......................................................................................................... 79 Import a Certification Authority....................................................................................79 Export a CA Certificate................................................................................................. 80 Create a CRL Manually................................................................................................. 82 Revoke Certification Authority......................................................................................82
CRL Distribution Point........................................................................................................83 Subject Alternative Name..................................................................................................84
6.2 6.3 6.3.1 6.3.2 6.3.3 6.3.4 6.3.5 6.4 6.4.1 6.4.2 6.4.3 6.4.4 6.4.5 6.5 6.6

7

Managing EST.............................................................................................................................................87

  • 7.1
  • Introduction......................................................................................................................88

Overview.....................................................................................................................88
EST Administration............................................................................................................88
Managing EST Clients.................................................................................................. 88 Managing EST Server................................................................................................... 89 Managing Remote Requests.........................................................................................90 Certificate Revocation List (CRL)...................................................................................91
7.1.1 7.2 7.2.1 7.2.2 7.2.3 7.2.4

8

Other Features............................................................................................................................................94

  • 8.1
  • Local User Management....................................................................................................95

Remote User Management................................................................................................97 Certificate Export to an LDAP Directory Service or Microsoft Active Directory.................... 100
Configuration............................................................................................................ 100 Certificate Export to LDAP.......................................................................................... 101
Attribute Certificates....................................................................................................... 106 Auto Logout....................................................................................................................114 Backup and Restore.........................................................................................................114 Signing Server.................................................................................................................119 Logging.......................................................................................................................... 119 Update to a New SICAM GridPass Version........................................................................ 122 Roles and Area of Responsibility according to IEC 62351-8...............................................123
8.2 8.3 8.3.1 8.3.2 8.4 8.5 8.6 8.7 8.8 8.9 8.10

A

Glossary.................................................................................................................................................... 126

  • SICAM, GridPass, Manual
  • 5

E50417-H8940-C598-A6, Edition 05.2020

  • 1
  • Overview

1.1 1.2 1.3 1.4

  • General
  • 7

778
Public Key Infrastructure (PKI) Certification Authority (CA) PKI Workflow

  • 6
  • SICAM, GridPass, Manual

E50417-H8940-C598-A6, Edition 05.2020
Overview
1.1 General

  • 1.1
  • General

Enrollment over secure transport, followed shortened as EST, is defined in RFC 7030 and profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile describes a simple yet functional certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. Enrollment over Secure Transport (EST) describes the use of Transport Layer Security (TLS) and Hypertext Transfer Protocol (HTTP) to provide an authenticated and authorized channel for simple Public Key Infrastructure (PKI) Requests and Responses. Architecturally, the EST service is located between a Certification Authority (CA) and a client. It performs several functions traditionally allocated to the Registration Authority (RA) role in a PKI. EST specifies how to transfer messages securely via HTTP over TLS (HTTPS), where the HTTP headers and media types are used in conjunction with TLS.

1.2 1.3
Public Key Infrastructure (PKI)

A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

Certification Authority (CA)

Parts of a PKI amongst others are one or more Certification Authorities (CA) which are entities issuing digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate.

Digital Certificate

A digital certificate is a data structure that binds a public key value to a subject. A binding is achieved by a trusted certification authority (CA) verifying the identity of the subject and digitally signing the certificate. The digital certificate has a limited lifetime that is checked by the relying party along with the signature.

[sc_digital_certificate, 2, en_US]

  • Figure 1-1
  • Digital Certificate

  • SICAM, GridPass, Manual
  • 7

E50417-H8940-C598-A6, Edition 05.2020
Overview 1.4 PKI Workflow

Registration Authority

A registration authority (RA) verifies the identity of entities requesting digital certificates and sends the certificate signing request to the CA. CA and RA are often co-located.

Certificate Revocation List (CRL)

A certificate revocation list is a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their scheduled expiration date and should no longer be trusted. The CRL distribution point, for example a Web server link, is stored inside the certificate. A CRL has a validity and has to be updated from the CA and downloaded from the entity before getting invalid. Often an interval of 24 hours is used.

[sc_certificate_revocation_list, 2, en_US]

  • Figure 1-2
  • Certificate Revocation List

  • 1.4
  • PKI Workflow

In the following figure, the PKI workflow with EST in the Siemens Energy environment is shown. In step (1) the entity creates an asymmetrical key pair to use it later for example as https server certificate. The entity creates a Certificate Signing Request (CSR) including the public key and entity information as well as the intended use of the requested certificate and sends it to the RA/CA (2). The RA/CA signs the CSR with the CA private key (3) and sends the created certificate back to the entity (4). In general certificates often will be stored in a public repository (Directory Service). In case of revoked certificates this CRL will also be stored in a public available repository (Directory Service or Web server).

  • 8
  • SICAM, GridPass, Manual

E50417-H8940-C598-A6, Edition 05.2020
Overview
1.4 PKI Workflow

[sc_pki_workflow, 2, en_US]

  • Figure 1-3
  • PKI Workflow

SICAM, GridPass, Manual E50417-H8940-C598-A6, Edition 05.2020
9

  • 2
  • Enrollment over Secure Transport (EST)

2.1 2.2 2.3
Function Authentication CRL
11 11 12

  • 10
  • SICAM, GridPass, Manual

E50417-H8940-C598-A6, Edition 05.2020
Enrollment over Secure Transport (EST)
2.1 Function

  • 2.1
  • Function

The EST protocol is described here as implemented for Siemens products in the Energy Automation/Digitalized Grid domain. All other flavors can be found inside the RFC 7030 of EST (https://tools.ietf.org/html/rfc7030). All other flavors can be found inside the RFC of EST. The EST protocol enables a PKI client (entity) to request a new certificate and a certificate renewal from a Certification Authority (CA). The EST Server acts as a Registration Authority (RA), the EST CA is logically "behind" the EST server. As EST is based on the TLS protocol, mutual authentication based on X.509 certificates is used here to authenticate the server against the entity and vice versa.

[sc_est_workflow, 2, en_US]

  • Figure 2-1
  • EST Workflow

  • 2.2
  • Authentication

At the beginning, the entity and EST server have X.509 certificates. The entity has initial imprinting certificates received during production phase or got the initial certificates during engineering phase. The SICAM GridPass EST server is placed inside the customer environment and gets the EST server certificate during the environment installation phase of SICAM GridPass as described in this document. The entities get the CA certificate which has issued the EST server certificate during engineering phase of the entity. The SICAM GridPass EST server gets the Siemens CA certificate during installation of SICAM GridPass in case Siemens imprinting certificates are used within the entities. In all other cases the CA certificates of all issuing CAs have to be imported beforehand. Now the chain of trust is established. The SICAM GridPass EST server can verify the entity certificates and the entities can verify the EST server certificate of SICAM GridPass. EST is based on TLS and is configured in Siemens Energy Automation products to use mutual authentication. The EST server is verifying the entity certificates and vice versa. The EST client (entity) is verifying the entity certificate during the TLS handshake. If the connection is established the CSR will be sent via the authenticated and secured connection. Also the signed certificate will be sent back to the entity via this connection.

  • SICAM, GridPass, Manual
  • 11

E50417-H8940-C598-A6, Edition 05.2020
Enrollment over Secure Transport (EST) 2.3 CRL

  • 2.3
  • CRL

The EST client and EST server check the validity of received certificates against a CRL. The CRL distribution point URL is stored inside the certificates and is generally a Web server (http). The CRL is updated continuously by the CA and the EST client has to retrieve the CRL before the next update information placed inside the CRL is reached. The CRL is signed by the CA which has issued the revoked certificate.

Recommended publications
  • The Dawn of Digital Industries Mindsphere Enables New Digital Transformations

    The Dawn of Digital Industries Mindsphere Enables New Digital Transformations

    The Dawn of Digital Industries MindSphere Enables New Digital Transformations A Frost & Sullivan White Paper Karthik Sundaram frost.com Introduction .....................................................................................................................................................................3 Converging ICT-OT Environments ........................................................................................................................................3 Benefits of the ICT-OT Convergence .........................................................................................................................3 Rising Importance of Openness and Heterogeneity in Digital Platforms .................................................................4 Evolving Business Models ......................................................................................................................................................4 Challenges behind Adoption of Digital Platforms ............................................................................................................6 The Dawn of Digital Industries ....................................................................................................................................7 Current State of Digitalization in Manufacturing ...........................................................................................................7 Approach to Digitalization ....................................................................................................................................................9
  • Fremdstoffe Bekennen Farbe Seite 20 Automatisierte Kolorimetrische Flüssigkeitsanalayse Erhöht Prozesssicherheit

    Fremdstoffe Bekennen Farbe Seite 20 Automatisierte Kolorimetrische Flüssigkeitsanalayse Erhöht Prozesssicherheit

    DASAUTOMATION FACHMAGAZIN FÜR MASCHINENBAU, ANLAGENBAU UND PRODUZENTEN | 1/MÄRZ 19 | AUTOMATION.AT SPECIAL HMIxx 84xxxx – 113 xx-xx ENDRESS+HAUSER FREMDSTOFFE BEKENNEN FARBE SEITE 20 AUTOMATISIERTE KOLORIMETRISCHE FLÜSSIGKEITSANALAYSE ERHÖHT PROZESSSICHERHEIT HANNOVER MESSE 2019 84 SEW-EURODRIVE 12 UND 108 Zum Leitthema „Integrated Industry – Industrial Am Beispiel einer realen Automobilfertigung Intelligence“ präsentieren rund 6.500 Aussteller zeigt SEW-Eurodrive auf der HMI die digitale aus aller Welt ihre Produkte und Leistungen auf Transformation in der Antriebstechnik. der HMI vom 01. bis 05. April 2019. Druckmessung Verrückt! Oder wie wir sagen: SITRANS P – eine schrecklich präzise Familie. Siemens Prozessinstrumentierung – messen, was wirklich wichtig ist. In der SITRANS P Familie sind alle echte Profis: Die zuverlässigen Messgeräte liefern exakte Ergebnisse, halten jedem Druck und hohen Temperaturen stand und sind speziell auf Ihre Bedürfnisse angepasst. Von Basic bis High-End lassen sich alle Geräte nahtlos in Ihr Leitsystem integrieren. Mit der neuen Generation legen wir noch weitere Vorteile drauf: Der SITRANS P320 ist der Nachfolger unseres berühmten DSIII. Der SITRANS P420 ergänzt das Vorgängermodell P410 um zusätzliche Funktionen – für noch mehr Messmöglichkeiten auf höchs- tem Niveau. Die neue Generation steigert Ihre Produktivität und ermöglicht die SIL-Inbetriebnahme berührungs- los aus der Warte. Sie behalten Ihre Daten immer fest im Blick. Sicher, schnell und einfach – dank SIL-by-Design, kürzerer Response Time und intuitiver
  • Key Quarterly Points by Chris Webber

    Key Quarterly Points by Chris Webber

    JANUARY 2019 Issue 2019-01 IDC Strategic Alliances and Ecosystem Newsletter Chris Webber Director, Strategic Alliances & Ecosystem Research [email protected] January 2019 MAXIMIZING OPPORTUNITIES THROUGH STRATEGIC ECOSYSTEMS Key Quarterly Points by Chris Webber Issue Date • Alliance and ecosystem leaders should continue to develop key entrepreneur traits such as; team development, life balance, mentoring, negotiator, creating market disruption and recognizing related opportunities • Ensuring a customer centric business is everyone's job in an organization. While marketers have been ‘the voice of the customer’, businesses must be structured in a way that enables collaboration across all functions – whether a CMO or CCO is at the center of that shouldn’t matter to truly serve that purpose. Strategic alliances and ecosystems leaders can and should play a key role in ensuring appropriate and beneficial collaboration. • Monitor market shifts. Track market trends as well as alliance and ecosystem developments in Asia. Companies are identifying and addressing current business gaps and GTM approaches that could create future competitive forces or provide success models for other markets. • Continue to evaluate all alliance and ecosystem business opportunities and approaches to success with key partners. Focus on ways to compliment your internal expertise and operations. JANUARY 2019 | Issue 2019-01 2 In This Issue Alliances and Industry News Page 3 Recent alliance announcements, industry trends, and organization spot light Companies in the Spotlight
  • Alibaba Cloud for Intelligent Business

    Alibaba Cloud for Intelligent Business

    Alibaba Cloud for Intelligent Business Yeming Wang General Manager EMEA, Alibaba Cloud International Exponential Networking Web Designer Online Shopping Guide Web Developer ¸ ¸ Aliwangwang Photographer Online Video Freelancing model Seller Buyer Age of Intelligent Business Age of Intelligent Business: The Big Data Bang+Exponential Networking Age of Information: PC in Company Age of Electricity: Ford Production Line in Factory Dual Cores of Intelligent Business All Business All Systems Digitized Online On Cloud Intelligent Dual-core Innovation in Intelligent Business Cloud-based Internet-enabled Datamation to The Infrastructure Core Business Intelligentization Starbucks The ground-breaking digital collaboration with Alibaba unlocks new levels of engagement: virtual store, Star Kitchens, Starbuck Delivers, and technology innovation. Unilever Partnership with Alibaba’s e-commerce ecosystem includes online retail marketplaces Tmall and Taobao, Cainiao logistics and online payment Ant Financial, cloud computing, and marketing technology platform, Alimama. Macau City Brain Transform Macau into a “smart city” via cloud-computing to foster development of tourism, transportation, healthcare, city governance and talent-nurturing. Rentokil Initial Business innovation on Cloud: developing AI dispatch engine that automatically schedules in real time, without human intervention, by leveraging AI to improve service quality and increase business efficiency. Siemens Creating a strong partner ecosystem with open platform as a service, by leveraging Siemens' MindSphere platform to facilitate manufacturing upgrade and anabling closed-loop innovation with digital twins. When West Meet East Go-China/Asia Multi-cloud Digital Transformation (Business Partner) (Best Choice) (AI Ready) The No.1 Public Cloud in China Recognition Market Share Coverage • 8 Regions • Alibaba Cloud is the No.1 in product offerings and • In 2018H1, Alibaba Cloud took 43.0% of the • 30 Availability Zones market performance.
  • How Iot Is Transforming the Industrial Ecosystem Market Drivers, the Changing Industrial Landscape and Strategic Considerations Introduction

    How Iot Is Transforming the Industrial Ecosystem Market Drivers, the Changing Industrial Landscape and Strategic Considerations Introduction

    How IoT is transforming the industrial ecosystem Market drivers, the changing industrial landscape and strategic considerations Introduction IIoT: Industrial as an IoT application The Internet of Things (IoT) will affect broad portions of the manufacturing process in large and significant ways. – Industrial Ethernet has been around since early 2000, but products like field devices remain unconnected or provide only one-way communication. – Industrial Internet of Things (IIoT) features two-way communication: Data is fed up to controller level (and to the Cloud in the future), but feedback is also provided to devices. Introduction A host of considerations When—and how—to introduce IIoT into manufacturing environments is not a one-size-fits-all endeavor. Discover industry challenges driving Explore factors contributing to the demand to implement IIoT solutions changing industrial ecosystem Examine device- and connectivity-level Review relevant factors while opportunities for introducing IIoT navigating the changing landscape Where are we now? Technology development Sensors are widely used in the manufacturing environment. But while their use will become more widespread, the ability to connect and transmit more data faster and with improved integrity will be the true enabler of IIoT. 90 90 Discrete control and visualization 80 80 Encoders 70 70 Industrial robots 60 60 Mobile assets Motor controls 50 50 Motors, generators and turbines 40 40 Process control and instrumentation 30 30 Pumps and compressors 20 20 Sensors Switchgear 10 10 2016: 99M IIoT 2021: 252M IIoT devices shipped devices shipped Where are we now? Improved data transmission Connectivity protocols and frameworks enable customers to collect and transfer more data quickly and accurately, from sensors up to the Cloud, for data aggregation and analytics.
  • Technology, Media & Telecom

    Technology, Media & Telecom

    Technology, Media & Telecom INFRASTRUCTURE SOFTWARE SECTOR REVIEW | Q3 2018 Investment banking services are provided by Harris Williams LLC and Solebury Capital LLC, registered broker-dealers and members of FINRA and SIPC, and Harris Williams Ltd, which is private limited company incorporated under English law with its registered office at 5th Floor, 6 St. Andrew Street, London EC4A 3AE, UK, registered with the Registrar of Companies for England and Wales (registration number 07078852). Harris Williams Ltd is authorized and regulated by the Financial Conduct Authority. Harris Williams is a trade name under which Harris Williams LLC and Harris Williams Ltd conduct business. INFRASTRUCTURE SOFTWARE SECTOR REVIEW | Q3 2018 HW Infrastructure Software Introduction TECHNOLOGY, MEDIA & TELECOM HARRIS WILLIAMS (“HW”) AS A FIRM Jeff Bistrong (“TMT”) GROUP Managing Director • Founded in 1991 • 35 professionals across Boston, San Francisco, and London [email protected] Office: (617) 654-2102 • 300+ professionals across eight offices globally • 47 closed transactions in the last 24 months • 140+ closed transactions in the last 24 months Internet and Digital Media Software / SaaS Tyler Dewing • 20th record year in 2017 • Consumer Internet • Enterprise Software Managing Director • Digital Media and Content • Data and Analytics [email protected] Office: (617) 654-2133 • 10 industry groups • eCommerce and Retail • Data Center and Managed • Mobile Services • Online Marketing • IT and Tech-Enabled Services Sam Hendler Managing Director
  • China's Digital Platform Economy: Assessing Developments Towards

    China's Digital Platform Economy: Assessing Developments Towards

    MERICS REPORT CHINA’S DIGITAL PLATFORM ECONOMY: ASSESSING DEVELOPMENTS TOWARDS INDUSTRY 4.0 Challenges and opportunities for German actors Rebecca Arcesati | Anna Holzmann | Yishu Mao | Manlai Nyamdorj | Kristin Shi-Kupfer | Kai von Carnap | Claudia Wessling June 2020 MERICS REPORT | June 2020 | 1 CHINA’S DIGITAL PLATFORM ECONOMY: ASSESSING DEVELOPMENTS TOWARDS INDUSTRY 4.0 Challenges and opportunities for German actors Rebecca Arcesati | Anna Holzmann | Yishu Mao | Manlai Nyamdorj | Kristin Shi-Kupfer | Kai von Carnap | Claudia Wessling Content Acknowledgements ..................................................................................................... 7 Executive Summary ..................................................................................................... 8 1. Introduction: China’s push into the digital platform economy ............................... 13 2. The strategic context: Digital platforms play a critical role for Beijing’s industrial modernization plans ..............................................................................16 2.1 Beijing pursues ambitious targets for the development of digital industrial platforms ............................................................................................... 16 2.2 Platform development in China’s manufacturing industry is still in its infancy..... 18 2.3 China’s top-down approach to industrial digitalization reflects unique conditions ...19 3. The actors: China’s top-level design enables highly coordinated development of the industrial internet
  • Mindsphere Connect and Monitor Solution Brief

    Mindsphere Connect and Monitor Solution Brief

    MindSphere Connect and Monitor Solution brief Siemens A packaged solution to To help manufacturers streamline their Challenges adoption of MindSphere, Siemens has streamline your IIoT • Build accurate production built a collection of packaged solutions schedules adoption for customers in different phases of their digitalization journey. The first is • Predict, prevent and quickly Manufacturers are rethinking their the Connect and Monitor Plan, which remediate asset failures operations strategies to maximize helps businesses connect critical assets, production and profits. However, legacy • Consistently meet production goals gain complete operational transparency tools and processes can impede these and take action to optimize perfor- initiatives. With these tools at their Solutions mance and health to maximize disposal, manufacturers lack the opera- • Securely connect machines, production and profits. tional transparency and actionable products, plants and systems insights they need to optimize factory Custom-built solutions aren’t • Simplify corrective actions to meet asset health and performance. the answer production goals Manufacturers can overcome these There are three areas that are of the • Optimize asset performance and challenges by adopting Siemens’ greatest concern to manufacturers: health Mindsphere – a cloud-based, open • Asset profiling and inventory: Internet of Things (IoT) operating Manufacturers commonly lack the Results system that enables you to securely ability to profile and inventory factory connect machines, products, plants • Securely send and store IoT data assets, limiting their insight into and systems. By doing so, you gain asset health and value and making it • Visualize and analyze connected complete, real-time transparency into, harder to build accurate production assets and analysis of asset health and schedules performance.
  • Mindapps and Applications for Mindsphere

    Mindapps and Applications for Mindsphere

    MindApps and Applications for MindSphere Benefits Unleash your IoT potential deployed for dedicated environments; or • Access the IoT platform optimized for with MindApps they can be offered to other customers in industrial IoT applications the MindSphere Store. MindSphere MindApps and Applications • Highly scalable, cost-effective cloud Optimize the entire value chain for MindSphere from Partners create value infrastructure based on Cloud Foundry, Digitalization opens up new avenues of from the Internet of Things (IoT) data including integration of AWS native innovation, differentiation and revenue. from connected machines and assets. services Companies can now collect data from MindApps and Applications for product design, prototype, manufacturing • High security standards MindSphere enable users to configure and the field. The challenge is deriving industrial assets, visualize analytics and • Easy data transfer into MindSphere value from these data sources to obtain a explore insights from relevant data for using plug-and-play connectivity competitive advantage. Companies must analysis. MindApps are Siemens devel- optimize their entire value-chain from oped applications based on broad domain design, engineering and manufacturing expertise across a wide range of indus- all the way through service. Many struggle tries. Applications for MindSphere are with generating business context across developed by partners or customers and the varied data sources and types. siemens.com/mindsphere MINDSPHERE MindApps and Applications for MindSphere MindSphere is the cloud-based, open IoT Open new revenue streams Product Intelligence, a MindApp operating system that lets you connect, IoT enables companies to offer new Product Intelligence is used to automate collect and get context from your IoT data. services to customers, which generates insight from product performance data to Collect real-world data and connect it to new revenue streams.
  • PLM Industry Summary Sara Vos, Editor Vol

    PLM Industry Summary Sara Vos, Editor Vol

    PLM Industry Summary Sara Vos, Editor Vol. 20 No. 9 - Friday, March 2, 2018 Contents CIMdata News _____________________________________________________________________ 2 CIMdata Brings the PLM Industry’s Premier Education and Training Program to the Midwest __________2 Digital Enterprises Demand Analytics-Driven Insights (CIMdata Commentary) ______________________3 HCL’s DFx Insights ’18 (CIMdata Commentary) ______________________________________________8 Acquisitions ______________________________________________________________________ 10 congatec AG acquires Real-Time Systems GmbH _____________________________________________10 Gamma Technologies Acquires AutoLion® Battery Modeling Software For Electric Vehicle Modeling __11 Nutanix Announces Intent to Acquire Minjar ________________________________________________12 SD3D Completes Acquisition of 3D Materials Research Firm 3D Matter ___________________________13 U.S. CAD Acquires Managed Design; Broadens BIM Services Available to AEC Firms in Minnesota ___14 Company News ____________________________________________________________________ 14 Accenture Opens Innovation Hub in Columbus, Adding 200 Jobs to City’s Tech Community __________14 ANSYS and MachineWorks Sign Agreement to Expand Use of Polygonica ________________________15 AVEVA completes transformational combination as a new software leader is born ___________________16 CBX Software Wins Green Supply Chain Award – Delivering ROI for Sustainable Retail Sourcing _____17 DeSL Continues to Support Apparel Industry Through Association
  • Mindsphere Devops Guide (PRC)

    Mindsphere Devops Guide (PRC)

    1 Introduction Development, Operation and Sales Process 2 MindSphere Platform Services 3 General Guidelines for Development and 4 Operation MindSphere DevOps Guide (PRC) Security Obligations 5 Readme Style Guide 6 11/2020 Version 1.3 (Nov. 2020) Table of contents 1 Introduction ........................................................................................................................................... 3 1.1 Scope .................................................................................................................................. 3 1.2 References for related materials ........................................................................................... 3 2 Development, Operation and Sales Process .......................................................................................... 4 3 MindSphere Platform Services .............................................................................................................. 7 3.1 Introduction ........................................................................................................................ 7 3.2 Use of MindSphere APIs ....................................................................................................... 8 3.3 Application call paths and MindSphere Gateway ................................................................... 8 4 General Guidelines for Development and Operation .......................................................................... 10 5 Security Obligations ...........................................................................................................................
  • ISG Providerlens™ Quadrant Report

    ISG Providerlens™ Quadrant Report

    Digital Business A research report comparing provider Transformation strengths, challenges and competitive Global 2019 differentiators Quadrant Report Customized report courtesy of: November 2018 ISG Provider Lens™ Quadrant Report | November 2018 Section Name About this Report Information Services Group, Inc. is solely responsible for the content of this report. ISG Provider Lens™ delivers leading-edge and actionable research studies, reports and consulting services focused on technology and service providers’ strength and Unless otherwise cited, all content, including illustrations, research, conclusions, weaknesses and how they are positioned relative to their peers in the market. These assertions and positions contained in this report were developed by and are the sole reports provide influential insights accessed by our large pool of advisors who are property of Information Services Group, Inc. actively advising outsourcing deals as well as large numbers of ISG enterprise clients who are potential outsourcers. The research and analysis presented in this report includes research from the ISG Provider Lens™ program, ongoing ISG Research programs, interviews with ISG advisors, For more information about our studies, please email [email protected], briefings with services providers and analysis of publicly available market information call +49 (0) 561-50697537, or visit ISG Provider Lens™ under ISG Provider Lens™. from multiple sources. The data collected for this report represents information that was current as of August, 31, 2018. ISG recognizes that many mergers and acquisitions have taken place since that time but those changes are not reflected in this report. The lead authors for this report are Dr. Kenn Walters. The editor is Jan Erik Aase.