{"id":245137,"date":"2024-10-19T16:07:06","date_gmt":"2024-10-19T16:07:06","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-62541-42020\/"},"modified":"2024-10-25T11:06:52","modified_gmt":"2024-10-25T11:06:52","slug":"bs-en-iec-62541-42020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-62541-42020\/","title":{"rendered":"BS EN IEC 62541-4:2020"},"content":{"rendered":"

IEC 62541-4:2020 is available as IEC 62541-4:2020 RLV<\/span> which contains the International Standard and its Redline version, showing all changes of the technical content compared to the previous edition.<\/p>\n

\n IEC 62541-4:2020 defines the OPC Unified Architecture (OPC UA) Services. The Services defined are the collection of abstract Remote Procedure Calls (RPC) that are implemented by OPC UA Servers and called by OPC UA Clients. All interactions between OPC UA Clients and Servers occur via these Services. The defined Services are considered abstract because no particular RPC mechanism for implementation is defined in this document. IEC 62541-6 specifies one or more concrete mappings supported for implementation. For example, one mapping in IEC 62541-6 is to XML Web Services. In that case the Services described in this document appear as the Web service methods in the WSDL contract. Not all OPC UA Servers will need to implement all of the defined Services. IEC 62541-7 defines the Profiles that dictate which Services need to be implemented in order to be compliant with a particular Profile This third edition cancels and replaces the second edition published in 2015. This edition constitutes a technical revision. This edition includes the following significant technical changes with respect to the previous edition: a) Added ability to resend all data of monitored items in a Subscription using the ResendData Method. b) Added support for durable Subscriptions (lifetime of hours or days). c) Added Register2 and FindServersOnNetwork Services to support network-wide discovery using capability filters. d) Removed definition of software certificates. Will be defined in a future edition. e) Extended and partially revised the redundancy definition. Added sub-range definitions for ServiceLevel and added more terms for redundancy. f) Added a section on how to use Authorization Services to request user access tokens. g) Added JSON Web Tokens (JWTs) as a new user token. h) Added the concept of session-less service invocation. i) Added a generic structure that allows passing any number of attributes to the AddNodes Service. j) Added requirement to protect against user identity token attacks. k) Added new EncryptedSecret format for user identity tokens.\n<\/div>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
5<\/td>\nAnnex ZA(normative)Normative references to international publicationswith their corresponding European publications <\/td>\n<\/tr>\n
7<\/td>\nEnglish
CONTENTS <\/td>\n<\/tr>\n
18<\/td>\nFOREWORD <\/td>\n<\/tr>\n
20<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
21<\/td>\n3 Terms, definitions, abbreviated terms and conventions
3.1 Terms and definitions <\/td>\n<\/tr>\n
22<\/td>\n3.2 Abbreviated terms
3.3 Conventions for Service definitions <\/td>\n<\/tr>\n
23<\/td>\nTables
Table 1 \u2013 Service definition table
Table 2 \u2013 Parameter Types defined in IEC 62541\u20113 <\/td>\n<\/tr>\n
24<\/td>\n4 Overview
4.1 Service Set model
Figures
Figure 1 \u2013 Discovery Service Set
Figure 2 \u2013 SecureChannel Service Set <\/td>\n<\/tr>\n
25<\/td>\nFigure 3 \u2013 Session Service Set
Figure 4 \u2013 NodeManagement Service Set
Figure 5 \u2013 View Service Set <\/td>\n<\/tr>\n
26<\/td>\nFigure 6 \u2013 Attribute Service Set
Figure 7 \u2013 Method Service Set <\/td>\n<\/tr>\n
27<\/td>\n4.2 Request\/response Service procedures
5 Service Sets
5.1 General
Figure 8 \u2013 MonitoredItem and Subscription Service Sets <\/td>\n<\/tr>\n
28<\/td>\n5.2 Service request and response header
5.3 Service results <\/td>\n<\/tr>\n
29<\/td>\n5.4 Discovery Service Set
5.4.1 Overview <\/td>\n<\/tr>\n
30<\/td>\nFigure 9 \u2013 Discovery process <\/td>\n<\/tr>\n
31<\/td>\n5.4.2 FindServers <\/td>\n<\/tr>\n
32<\/td>\n5.4.3 FindServersOnNetwork
Table 3 \u2013 FindServers Service parameters <\/td>\n<\/tr>\n
33<\/td>\nTable 4 \u2013 FindServersOnNetwork Service parameters <\/td>\n<\/tr>\n
34<\/td>\n5.4.4 GetEndpoints <\/td>\n<\/tr>\n
35<\/td>\nFigure 10 \u2013 Using a Gateway Server <\/td>\n<\/tr>\n
36<\/td>\n5.4.5 RegisterServer
Table 5 \u2013 GetEndpoints Service parameters <\/td>\n<\/tr>\n
37<\/td>\nFigure 11 \u2013 The registration process \u2013 Manually launched servers
Figure 12 \u2013 The registration process \u2013 Automatically launched servers <\/td>\n<\/tr>\n
38<\/td>\nTable 6 \u2013 RegisterServer Service parameters
Table 7 \u2013 RegisterServer Service result codes <\/td>\n<\/tr>\n
39<\/td>\n5.4.6 RegisterServer2
Table 8 \u2013 RegisterServer2 <\/td>\n<\/tr>\n
40<\/td>\n5.5 SecureChannel Service Set
5.5.1 Overview
Table 9 \u2013 RegisterServer2 Service result codes
Table 10 \u2013 RegisterServer2 Operation Level result codes <\/td>\n<\/tr>\n
41<\/td>\n5.5.2 OpenSecureChannel
Figure 13 \u2013 SecureChannel and Session Services <\/td>\n<\/tr>\n
43<\/td>\nTable 11 \u2013 OpenSecureChannel Service parameters <\/td>\n<\/tr>\n
45<\/td>\n5.5.3 CloseSecureChannel
Table 12 \u2013 OpenSecureChannel Service result codes <\/td>\n<\/tr>\n
46<\/td>\n5.6 Session Service Set
5.6.1 Overview
5.6.2 CreateSession
Table 13 \u2013 CloseSecureChannel Service parameters
Table 14 \u2013 CloseSecureChannel Service result codes <\/td>\n<\/tr>\n
48<\/td>\nFigure 14 \u2013 Multiplexing users on a Session <\/td>\n<\/tr>\n
49<\/td>\nTable 15 \u2013 CreateSession Service parameters <\/td>\n<\/tr>\n
51<\/td>\n5.6.3 ActivateSession
Table 16 \u2013 CreateSession Service result codes <\/td>\n<\/tr>\n
53<\/td>\nTable 17 \u2013 ActivateSession Service parameters <\/td>\n<\/tr>\n
54<\/td>\n5.6.4 CloseSession
Table 18 \u2013 ActivateSession Service result codes
Table 19 \u2013 CloseSession Service parameters <\/td>\n<\/tr>\n
55<\/td>\n5.6.5 Cancel
5.7 NodeManagement Service Set
5.7.1 Overview
5.7.2 AddNodes
Table 20 \u2013 CloseSession Service result codes
Table 21 \u2013 Cancel Service parameters <\/td>\n<\/tr>\n
56<\/td>\nTable 22 \u2013 AddNodes Service parameters <\/td>\n<\/tr>\n
57<\/td>\n5.7.3 AddReferences
Table 23 \u2013 AddNodes Service result codes
Table 24 \u2013 AddNodes Operation Level result codes <\/td>\n<\/tr>\n
58<\/td>\nTable 25 \u2013 AddReferences Service parameters
Table 26 \u2013 AddReferences Service result codes <\/td>\n<\/tr>\n
59<\/td>\n5.7.4 DeleteNodes
Table 27 \u2013 AddReferences Operation Level result codes <\/td>\n<\/tr>\n
60<\/td>\nTable 28 \u2013 DeleteNodes Service parameters
Table 29 \u2013 DeleteNodes Service result codes <\/td>\n<\/tr>\n
61<\/td>\n5.7.5 DeleteReferences
Table 30 \u2013 DeleteNodes Operation Level result codes
Table 31 \u2013 DeleteReferences Service parameters <\/td>\n<\/tr>\n
62<\/td>\n5.8 View Service Set
5.8.1 Overview
5.8.2 Browse
Table 32 \u2013 DeleteReferences Service result codes
Table 33 \u2013 DeleteReferences Operation Level result codes <\/td>\n<\/tr>\n
63<\/td>\nTable 34 \u2013 Browse Service parameters <\/td>\n<\/tr>\n
64<\/td>\nTable 35 \u2013 Browse Service result codes <\/td>\n<\/tr>\n
65<\/td>\n5.8.3 BrowseNext
Table 36 \u2013 Browse Operation Level result codes <\/td>\n<\/tr>\n
66<\/td>\nTable 37 \u2013 BrowseNext Service parameters
Table 38 \u2013 BrowseNext Service result codes <\/td>\n<\/tr>\n
67<\/td>\n5.8.4 TranslateBrowsePathsToNodeIds
Table 39 \u2013 BrowseNext Operation Level result codes <\/td>\n<\/tr>\n
68<\/td>\nTable 40 \u2013 TranslateBrowsePathsToNodeIds Service parameters
Table 41 \u2013 TranslateBrowsePathsToNodeIds Service result codes <\/td>\n<\/tr>\n
69<\/td>\n5.8.5 RegisterNodes
Table 42 \u2013 TranslateBrowsePathsToNodeIds Operation Level result codes <\/td>\n<\/tr>\n
70<\/td>\n5.8.6 UnregisterNodes
Table 43 \u2013 RegisterNodes Service parameters
Table 44 \u2013 RegisterNodes Service result codes <\/td>\n<\/tr>\n
71<\/td>\n5.9 Query Service Set
5.9.1 Overview
5.9.2 Querying Views
Table 45 \u2013 UnregisterNodes Service parameters
Table 46 \u2013 UnregisterNodes Service result codes <\/td>\n<\/tr>\n
72<\/td>\n5.9.3 QueryFirst <\/td>\n<\/tr>\n
73<\/td>\nTable 47 \u2013 QueryFirst Request parameters <\/td>\n<\/tr>\n
74<\/td>\nTable 48 \u2013 QueryFirst Response parameters <\/td>\n<\/tr>\n
75<\/td>\n5.9.4 QueryNext
Table 49 \u2013 QueryFirst Service result codes
Table 50 \u2013 QueryFirst Operation Level result codes <\/td>\n<\/tr>\n
76<\/td>\n5.10 Attribute Service Set
5.10.1 Overview
Table 51 \u2013 QueryNext Service parameters
Table 52 \u2013 QueryNext Service result codes <\/td>\n<\/tr>\n
77<\/td>\n5.10.2 Read
Table 53 \u2013 Read Service parameters <\/td>\n<\/tr>\n
78<\/td>\n5.10.3 HistoryRead
Table 54 \u2013 Read Service result codes
Table 55 \u2013 Read Operation Level result codes <\/td>\n<\/tr>\n
79<\/td>\nTable 56 \u2013 HistoryRead Service parameters <\/td>\n<\/tr>\n
81<\/td>\n5.10.4 Write
Table 57 \u2013 HistoryRead Service result codes
Table 58 \u2013 HistoryRead Operation Level result codes <\/td>\n<\/tr>\n
83<\/td>\nTable 59 \u2013 Write Service parameters <\/td>\n<\/tr>\n
84<\/td>\n5.10.5 HistoryUpdate
Table 60 \u2013 Write Service result codes
Table 61 \u2013 Write Operation Level result codes <\/td>\n<\/tr>\n
85<\/td>\nTable 62 \u2013 HistoryUpdate Service parameters
Table 63 \u2013 HistoryUpdate Service result codes <\/td>\n<\/tr>\n
86<\/td>\n5.11 Method Service Set
5.11.1 Overview
5.11.2 Call
Table 64 \u2013 HistoryUpdate Operation Level result codes <\/td>\n<\/tr>\n
87<\/td>\nTable 65 \u2013 Call Service parameters <\/td>\n<\/tr>\n
88<\/td>\nTable 66 \u2013 Call Service result codes
Table 67 \u2013 Call Operation Level result codes <\/td>\n<\/tr>\n
89<\/td>\n5.12 MonitoredItem Service Set
5.12.1 MonitoredItem model
Figure 15 \u2013 MonitoredItem model
Table 68 \u2013 Call Input Argument Result Codes <\/td>\n<\/tr>\n
91<\/td>\nFigure 16 \u2013 Typical delay in change detection <\/td>\n<\/tr>\n
92<\/td>\nFigure 17 \u2013 Queue overflow handling <\/td>\n<\/tr>\n
93<\/td>\nFigure 18 \u2013 Triggering model <\/td>\n<\/tr>\n
94<\/td>\n5.12.2 CreateMonitoredItems <\/td>\n<\/tr>\n
96<\/td>\nTable 69 \u2013 CreateMonitoredItems Service parameters <\/td>\n<\/tr>\n
97<\/td>\n5.12.3 ModifyMonitoredItems
Table 70 \u2013 CreateMonitoredItems Service result codes
Table 71 \u2013 CreateMonitoredItems Operation Level result codes <\/td>\n<\/tr>\n
98<\/td>\nTable 72 \u2013 ModifyMonitoredItems Service parameters <\/td>\n<\/tr>\n
99<\/td>\n5.12.4 SetMonitoringMode
Table 73 \u2013 ModifyMonitoredItems Service result codes
Table 74 \u2013 ModifyMonitoredItems Operation Level result codes <\/td>\n<\/tr>\n
100<\/td>\n5.12.5 SetTriggering
Table 75 \u2013 SetMonitoringMode service parameters
Table 76 \u2013 SetMonitoringMode Service result codes
Table 77 \u2013 SetMonitoringMode Operation Level result codes <\/td>\n<\/tr>\n
101<\/td>\nTable 78 \u2013 SetTriggering Service parameters
Table 79 \u2013 SetTriggering Service result codes <\/td>\n<\/tr>\n
102<\/td>\n5.12.6 DeleteMonitoredItems
Table 80 \u2013 SetTriggering Operation Level result codes
Table 81 \u2013 DeleteMonitoredItems Service parameters <\/td>\n<\/tr>\n
103<\/td>\n5.13 Subscription Service Set
5.13.1 Subscription model
Table 82 \u2013 DeleteMonitoredItems Service result codes
Table 83 \u2013 DeleteMonitoredItems Operation Level result codes <\/td>\n<\/tr>\n
106<\/td>\nTable 84 \u2013 Subscription states <\/td>\n<\/tr>\n
107<\/td>\nTable 85 \u2013 Subscription state table <\/td>\n<\/tr>\n
110<\/td>\nTable 86 \u2013 State variables and parameters <\/td>\n<\/tr>\n
111<\/td>\nTable 87 \u2013 Functions <\/td>\n<\/tr>\n
112<\/td>\n5.13.2 CreateSubscription
Table 88 \u2013 CreateSubscription Service parameters <\/td>\n<\/tr>\n
113<\/td>\n5.13.3 ModifySubscription
Table 89 \u2013 CreateSubscription Service result codes <\/td>\n<\/tr>\n
114<\/td>\nTable 90 \u2013 ModifySubscription Service parameters <\/td>\n<\/tr>\n
115<\/td>\n5.13.4 SetPublishingMode
Table 91 \u2013 ModifySubscription Service result codes
Table 92 \u2013 SetPublishingMode Service parameters
Table 93 \u2013 SetPublishingMode Service result codes <\/td>\n<\/tr>\n
116<\/td>\n5.13.5 Publish
Table 94 \u2013 SetPublishingMode Operation Level result codes <\/td>\n<\/tr>\n
117<\/td>\nTable 95 \u2013 Publish Service parameters
Table 96 \u2013 Publish Service result codes <\/td>\n<\/tr>\n
118<\/td>\n5.13.6 Republish
Table 97 \u2013 Publish Operation Level Result Codes
Table 98 \u2013 Republish Service parameters
Table 99 \u2013 Republish Service result codes <\/td>\n<\/tr>\n
119<\/td>\n5.13.7 TransferSubscriptions <\/td>\n<\/tr>\n
120<\/td>\nTable 100 \u2013 TransferSubscriptions Service parameters
Table 101 \u2013 TransferSubscriptions Service result codes <\/td>\n<\/tr>\n
121<\/td>\n5.13.8 DeleteSubscriptions
Table 102 \u2013 TransferSubscriptions Operation Level result codes
Table 103 \u2013 DeleteSubscriptions Service parameters <\/td>\n<\/tr>\n
122<\/td>\n6 Service behaviours
6.1 Security
6.1.1 Overview
6.1.2 Obtaining and installing an Application Instance Certificate
Table 104 \u2013 DeleteSubscriptions Service result codes
Table 105 \u2013 DeleteSubscriptions Operation Level result codes <\/td>\n<\/tr>\n
123<\/td>\n6.1.3 Determining if a Certificate is trusted
Figure 19 \u2013 Obtaining and installing an Application Instance Certificate <\/td>\n<\/tr>\n
124<\/td>\nTable 106 \u2013 Certificate validation steps <\/td>\n<\/tr>\n
126<\/td>\n6.1.4 Creating a SecureChannel
Figure 20 \u2013 Determining if an Application Instance Certificate is trusted <\/td>\n<\/tr>\n
127<\/td>\nFigure 21 \u2013 Establishing a SecureChannel <\/td>\n<\/tr>\n
128<\/td>\n6.1.5 Creating a Session
Figure 22 \u2013 Establishing a Session <\/td>\n<\/tr>\n
129<\/td>\n6.1.6 Impersonating a User
6.2 Authorization Services
6.2.1 Overview
6.2.2 Indirect handshake with an Identity Provider
Figure 23 \u2013 Impersonating a User <\/td>\n<\/tr>\n
130<\/td>\n6.2.3 Direct handshake with an Identity Provider
Figure 24 \u2013 Indirect handshake with an Identity Provider <\/td>\n<\/tr>\n
131<\/td>\n6.3 Session-less Service invocation
6.3.1 Description
Figure 25 \u2013 Direct handshake with an Identity Provider <\/td>\n<\/tr>\n
132<\/td>\n6.3.2 Parameters
Table 107 \u2013 SessionlessInvoke Service parameters <\/td>\n<\/tr>\n
133<\/td>\n6.3.3 Service results
6.4 Software Certificates
6.5 Auditing
6.5.1 Overview
6.5.2 General audit logs
Table 108 \u2013 SessionlessInvoke Service result codes <\/td>\n<\/tr>\n
134<\/td>\n6.5.3 General audit Events
6.5.4 Auditing for Discovery Service Set
6.5.5 Auditing for SecureChannel Service Set
6.5.6 Auditing for Session Service Set <\/td>\n<\/tr>\n
135<\/td>\n6.5.7 Auditing for NodeManagement Service Set
6.5.8 Auditing for Attribute Service Set <\/td>\n<\/tr>\n
136<\/td>\n6.5.9 Auditing for Method Service Set
6.5.10 Auditing for View, Query, MonitoredItem and Subscription Service Set
6.6 Redundancy
6.6.1 Redundancy overview <\/td>\n<\/tr>\n
137<\/td>\n6.6.2 Server Redundancy <\/td>\n<\/tr>\n
138<\/td>\nFigure 26 \u2013 Transparent Redundancy setup example <\/td>\n<\/tr>\n
139<\/td>\nFigure 27 \u2013 Non-Transparent Redundancy setup <\/td>\n<\/tr>\n
141<\/td>\nTable 109 \u2013 ServiceLevel ranges <\/td>\n<\/tr>\n
142<\/td>\nTable 110 \u2013 Server Failover modes <\/td>\n<\/tr>\n
143<\/td>\nFigure 28 \u2013 Client Start-up steps
Table 111 \u2013 Redundancy Failover actions <\/td>\n<\/tr>\n
144<\/td>\nFigure 29 \u2013 Cold Failover <\/td>\n<\/tr>\n
145<\/td>\nFigure 30 \u2013 Warm Failover <\/td>\n<\/tr>\n
146<\/td>\nFigure 31 \u2013 Hot Failover <\/td>\n<\/tr>\n
147<\/td>\nFigure 32 \u2013 HotAndMirrored Failover <\/td>\n<\/tr>\n
148<\/td>\n6.6.3 Client Redundancy
6.6.4 Network Redundancy
Figure 33 \u2013 Server proxy for Redundancy <\/td>\n<\/tr>\n
149<\/td>\nFigure 34 \u2013 Transparent network Redundancy <\/td>\n<\/tr>\n
150<\/td>\n6.6.5 Manually forcing Failover
6.7 Re-establishing connections
Figure 35 \u2013 Non-transparent network Redundancy <\/td>\n<\/tr>\n
151<\/td>\nFigure 36 \u2013 Reconnect sequence <\/td>\n<\/tr>\n
152<\/td>\n6.8 Durable Subscriptions <\/td>\n<\/tr>\n
153<\/td>\n7 Common parameter type definitions
7.1 ApplicationDescription <\/td>\n<\/tr>\n
154<\/td>\n7.2 ApplicationInstanceCertificate
Table 112 \u2013 ApplicationDescription <\/td>\n<\/tr>\n
155<\/td>\n7.3 BrowseResult
Table 113 \u2013 ApplicationInstanceCertificate
Table 114 \u2013 BrowseResult <\/td>\n<\/tr>\n
156<\/td>\n7.4 ContentFilter
7.4.1 ContentFilter structure
7.4.2 ContentFilterResult
Table 115 \u2013 ContentFilter structure
Table 116 \u2013 ContentFilterResult structure <\/td>\n<\/tr>\n
157<\/td>\n7.4.3 FilterOperator
Table 117 \u2013 ContentFilterResult result codes
Table 118 \u2013 ContentFilterResult Operand result codes
Table 119 \u2013 Basic FilterOperator definition <\/td>\n<\/tr>\n
160<\/td>\nTable 120 \u2013 Complex FilterOperator definition <\/td>\n<\/tr>\n
161<\/td>\nTable 121 \u2013 Wildcard characters <\/td>\n<\/tr>\n
162<\/td>\nTable 122 \u2013 Conversion rules <\/td>\n<\/tr>\n
163<\/td>\nTable 123 \u2013 Data Precedence rules <\/td>\n<\/tr>\n
164<\/td>\n7.4.4 FilterOperand parameters
Table 124 \u2013 Logical AND Truth table
Table 125 \u2013 Logical OR Truth table
Table 126 \u2013 FilterOperand parameter TypeIds <\/td>\n<\/tr>\n
165<\/td>\nTable 127 \u2013 ElementOperand
Table 128 \u2013 LiteralOperand
Table 129 \u2013 AttributeOperand <\/td>\n<\/tr>\n
166<\/td>\n7.5 Counter
7.6 ContinuationPoint
Table 130 \u2013 SimpleAttributeOperand <\/td>\n<\/tr>\n
167<\/td>\n7.7 DataValue
7.7.1 General
7.7.2 PicoSeconds
7.7.3 SourceTimestamp
Table 131 \u2013 DataValue <\/td>\n<\/tr>\n
168<\/td>\n7.7.4 ServerTimestamp
7.7.5 StatusCode assigned to a value <\/td>\n<\/tr>\n
169<\/td>\n7.8 DiagnosticInfo <\/td>\n<\/tr>\n
170<\/td>\n7.9 DiscoveryConfiguration parameters
7.9.1 Overview
Table 132 \u2013 DiagnosticInfo
Table 133 \u2013 DiscoveryConfiguration parameterTypeIds <\/td>\n<\/tr>\n
171<\/td>\n7.9.2 MdnsDiscoveryConfiguration
7.10 EndpointDescription
Table 134 \u2013 MdnsDiscoveryConfiguration
Table 135 \u2013 EndpointDescription <\/td>\n<\/tr>\n
172<\/td>\n7.11 ExpandedNodeId
7.12 ExtensibleParameter
7.13 Index
7.14 IntegerId
Table 136 \u2013 ExpandedNodeId
Table 137 \u2013 ExtensibleParameter base type <\/td>\n<\/tr>\n
173<\/td>\n7.15 MessageSecurityMode
7.16 MonitoringParameters
Table 138 \u2013 MessageSecurityMode values
Table 139 \u2013 MonitoringParameters <\/td>\n<\/tr>\n
174<\/td>\n7.17 MonitoringFilter parameters
7.17.1 Overview
Table 140 \u2013 MonitoringFilter parameterTypeIds <\/td>\n<\/tr>\n
175<\/td>\n7.17.2 DataChangeFilter
Table 141 \u2013 DataChangeFilter <\/td>\n<\/tr>\n
176<\/td>\n7.17.3 EventFilter <\/td>\n<\/tr>\n
177<\/td>\nTable 142 \u2013 EventFilter structure
Table 143 \u2013 EventFilterResult structure <\/td>\n<\/tr>\n
178<\/td>\n7.17.4 AggregateFilter
Table 144 \u2013 EventFilterResult result codes <\/td>\n<\/tr>\n
179<\/td>\n7.18 MonitoringMode
Table 145 \u2013 AggregateFilter structure
Table 146 \u2013 AggregateFilterResult structure <\/td>\n<\/tr>\n
180<\/td>\n7.19 NodeAttributes parameters
7.19.1 Overview
Table 147 \u2013 MonitoringMode values
Table 148 \u2013 NodeAttributes parameterTypeIds <\/td>\n<\/tr>\n
181<\/td>\n7.19.2 ObjectAttributes parameter
7.19.3 VariableAttributes parameter
Table 149 \u2013 Bit mask for specified Attributes
Table 150 \u2013 ObjectAttributes <\/td>\n<\/tr>\n
182<\/td>\n7.19.4 MethodAttributes parameter
7.19.5 ObjectTypeAttributes parameter
Table 151 \u2013 VariableAttributes
Table 152 \u2013 MethodAttributes <\/td>\n<\/tr>\n
183<\/td>\n7.19.6 VariableTypeAttributes parameter
7.19.7 ReferenceTypeAttributes parameter
Table 153 \u2013 ObjectTypeAttributes
Table 154 \u2013 VariableTypeAttributes <\/td>\n<\/tr>\n
184<\/td>\n7.19.8 DataTypeAttributes parameter
7.19.9 ViewAttributes parameter
Table 155 \u2013 ReferenceTypeAttributes
Table 156 \u2013 DataTypeAttributes <\/td>\n<\/tr>\n
185<\/td>\n7.19.10 GenericAttributes parameter
7.20 NotificationData parameters
7.20.1 Overview
Table 157 \u2013 ViewAttributes
Table 158 \u2013 GenericAttributes <\/td>\n<\/tr>\n
186<\/td>\n7.20.2 DataChangeNotification parameter
7.20.3 EventNotificationList parameter
Table 159 \u2013 NotificationData parameterTypeIds
Table 160 \u2013 DataChangeNotification <\/td>\n<\/tr>\n
187<\/td>\n7.20.4 StatusChangeNotification parameter
7.21 NotificationMessage
7.22 NumericRange
Table 161 \u2013 EventNotificationList
Table 162 \u2013 StatusChangeNotification
Table 163 \u2013 NotificationMessage <\/td>\n<\/tr>\n
188<\/td>\n7.23 QueryDataSet
Table 164 \u2013 NumericRange <\/td>\n<\/tr>\n
189<\/td>\n7.24 ReadValueId
Table 165 \u2013 QueryDataSet <\/td>\n<\/tr>\n
190<\/td>\n7.25 ReferenceDescription
Table 166 \u2013 ReadValueId <\/td>\n<\/tr>\n
191<\/td>\n7.26 RelativePath
Table 167 \u2013 ReferenceDescription
Table 168 \u2013 RelativePath <\/td>\n<\/tr>\n
192<\/td>\n7.27 RegisteredServer
7.28 RequestHeader
Table 169 \u2013 RegisteredServer <\/td>\n<\/tr>\n
193<\/td>\nTable 170 \u2013 RequestHeader <\/td>\n<\/tr>\n
194<\/td>\n7.29 ResponseHeader
7.30 ServiceFault
Table 171 \u2013 ResponseHeader <\/td>\n<\/tr>\n
195<\/td>\n7.31 SessionAuthenticationToken
Figure 37 \u2013 Logical layers of a Server
Table 172 \u2013 ServiceFault <\/td>\n<\/tr>\n
196<\/td>\n7.32 SignatureData
7.33 SignedSoftwareCertificate
Figure 38 \u2013 Obtaining a SessionAuthenticationToken
Table 173 \u2013 SignatureData <\/td>\n<\/tr>\n
197<\/td>\n7.34 StatusCode
7.34.1 General
Table 174 \u2013 SignedSoftwareCertificate <\/td>\n<\/tr>\n
198<\/td>\nTable 175 \u2013 StatusCode bit assignments <\/td>\n<\/tr>\n
199<\/td>\n7.34.2 Common StatusCodes
Table 176 \u2013 DataValue InfoBits <\/td>\n<\/tr>\n
200<\/td>\nTable 177 \u2013 Common Service result codes <\/td>\n<\/tr>\n
202<\/td>\nTable 178 \u2013 Common Operation Level result codes <\/td>\n<\/tr>\n
203<\/td>\n7.35 TimestampsToReturn
7.36 UserIdentityToken parameters
7.36.1 Overview
Table 179 \u2013 TimestampsToReturn values <\/td>\n<\/tr>\n
204<\/td>\n7.36.2 Token Encryption and Proof of Possession
Table 180 \u2013 UserIdentityToken parameterTypeIds <\/td>\n<\/tr>\n
205<\/td>\nFigure 39 \u2013 EncryptedSecret layout
Table 181 \u2013 Legacy UserIdentityToken Encrypted Token Secret Format <\/td>\n<\/tr>\n
207<\/td>\nTable 182 \u2013 EncryptedSecret layout
Table 183 \u2013 EncryptedSecret DataTypes <\/td>\n<\/tr>\n
208<\/td>\n7.36.3 AnonymousIdentityToken
7.36.4 UserNameIdentityToken
Table 184 \u2013 RsaEncryptedSecret structure
Table 185 \u2013 AnonymousIdentityToken <\/td>\n<\/tr>\n
209<\/td>\nTable 186 \u2013 UserNameIdentityToken
Table 187 \u2013 EncryptionAlgorithm selection <\/td>\n<\/tr>\n
210<\/td>\n7.36.5 X509IdentityTokens
7.36.6 IssuedIdentityToken
Table 188 \u2013 X.509 v3 Identity Token <\/td>\n<\/tr>\n
211<\/td>\n7.37 UserTokenPolicy
Table 189 \u2013 IssuedIdentityToken
Table 190 \u2013 UserTokenPolicy <\/td>\n<\/tr>\n
212<\/td>\n7.38 VersionTime
7.39 ViewDescription
Table 191 \u2013 ViewDescription <\/td>\n<\/tr>\n
213<\/td>\nAnnex A (informative) BNF definitions
A.1 Overview over BNF
A.2 BNF of RelativePath
Table A.1 \u2013 RelativePath <\/td>\n<\/tr>\n
214<\/td>\nA.3 BNF of NumericRange
Table A.2 \u2013 RelativePath Examples <\/td>\n<\/tr>\n
215<\/td>\nAnnex B (informative) ContentFilter and Query examples
B.1 Simple ContentFilter examples
B.1.1 Overview
B.1.2 Example 1
Figure B.1 \u2013 Filter logic tree example <\/td>\n<\/tr>\n
216<\/td>\nB.1.3 Example 2
Figure B.2 \u2013 Filter logic tree example
Table B.1 \u2013 ContentFilter example
Table B.2 \u2013 ContentFilter example <\/td>\n<\/tr>\n
217<\/td>\nB.2 Complex examples of Query filters
B.2.1 Overview
B.2.2 Used type model <\/td>\n<\/tr>\n
219<\/td>\nFigure B.3 \u2013 Example Type Nodes <\/td>\n<\/tr>\n
220<\/td>\nB.2.3 Example Notes
Figure B.4 \u2013 Example Instance Nodes <\/td>\n<\/tr>\n
221<\/td>\nB.2.4 Example 1
Figure B.5 \u2013 Example 1 Filter
Table B.3 \u2013 Example 1 NodeTypeDescription
Table B.4 \u2013 Example 1 ContentFilter <\/td>\n<\/tr>\n
222<\/td>\nB.2.5 Example 2
Table B.5 \u2013 Example 1 QueryDataSets
Table B.6 \u2013 Example 2 NodeTypeDescription <\/td>\n<\/tr>\n
223<\/td>\nB.2.6 Example 3
Figure B.6 \u2013 Example 2 Filter logic tree
Table B.7 \u2013 Example 2 ContentFilter
Table B.8 \u2013 Example 2 QueryDataSets <\/td>\n<\/tr>\n
224<\/td>\nFigure B.7 \u2013 Example 3 Filter logic tree
Table B.9 \u2013 Example 3 NodeTypeDescription <\/td>\n<\/tr>\n
225<\/td>\nTable B.10 \u2013 Example 3 ContentFilter <\/td>\n<\/tr>\n
226<\/td>\nB.2.7 Example 4
Figure B.8 \u2013 Example 4 Filter logic tree
Table B.11 \u2013 Example 3 QueryDataSets
Table B.12 \u2013 Example 4 NodeTypeDescription <\/td>\n<\/tr>\n
227<\/td>\nB.2.8 Example 5
Figure B.9 \u2013 Example 5 Filter logic tree
Table B.13 \u2013 Example 4 ContentFilter
Table B.14 \u2013 Example 4 QueryDataSets
Table B.15 \u2013 Example 5 NodeTypeDescription <\/td>\n<\/tr>\n
228<\/td>\nB.2.9 Example 6
Table B.16 \u2013 Example 5 ContentFilter
Table B.17 \u2013 Example 5 QueryDataSets
Table B.18 \u2013 Example 6 NodeTypeDescription <\/td>\n<\/tr>\n
229<\/td>\nFigure B.10 \u2013 Example 6 Filter logic tree
Table B.19 \u2013 Example 6 ContentFilter
Table B.20 \u2013 Example 6 QueryDataSets <\/td>\n<\/tr>\n
230<\/td>\nB.2.10 Example 7
Table B.21 \u2013 Example 6 QueryDataSets without additional information
Table B.22 \u2013 Example 7 NodeTypeDescription <\/td>\n<\/tr>\n
231<\/td>\nFigure B.11 \u2013 Example 7 Filter logic tree
Table B.23 \u2013 Example 7 ContentFilter
Table B.24 \u2013 Example 7 QueryDataSets <\/td>\n<\/tr>\n
232<\/td>\nB.2.11 Example 8
Figure B.12 \u2013 Example 8 Filter logic tree
Table B.25 \u2013 Example 8 NodeTypeDescription
Table B.26 \u2013 Example 8 ContentFilter <\/td>\n<\/tr>\n
233<\/td>\nB.2.12 Example 9
Figure B.13 \u2013 Example 9 Filter logic tree
Table B.27 \u2013 Example 8 QueryDataSets
Table B.28 \u2013 Example 9 NodeTypeDescription <\/td>\n<\/tr>\n
234<\/td>\nTable B.29 \u2013 Example 9 ContentFilter
Table B.30 \u2013 Example 9 QueryDataSets <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

OPC Unified Architecture – Services<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2020<\/td>\n236<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":245139,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[668,2641],"product_tag":[],"class_list":{"0":"post-245137","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-100-05","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/245137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/245139"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=245137"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=245137"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=245137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}