OPC UA Client Driver

Not counted towards your tag license limit.

UA stands for "Unified Architecture". The OPC UA Client driver interfaces to an OPC UA server running on either the local or another computer.

OPC UA is an alternative communication protocol to OPC CLASSIC, which used DCOM for communication between a client and a server. VTScada still supports the existing OPC CLASSIC driver.

Unlike OPC CLASSIC, OPC UA, does not rely on third-party "OPC-tunnellers" to act as proxies between the client and server. An OPC UA server may run on a remote computer or be embedded in a smart device and can run on a variety of operating systems. Because there are a limited number of OPC UA products, a tunneller can be used to connect OPC UA clients to an OPC CLASSIC server.

Do not proceed with OPC UA Client Driver configuration until you have read the related information in the topic, OPC UA Support & Security

If both client and server are using OPC UA, the only additional configuration necessary is to ensure that firewalls allow the correct ports to be opened and that trust is established between the server and client. The port(s) in use are defined by the OPC UA server.

The "None" security policy permits communication without encryption or message signing (no confidentiality or integrity). This should only be selected for testing or when the connection is otherwise protected by external means, such as a VPN between the VTScada system and the OPC UA server.
Where encryption or cryptographic signing of communication is desired (recommended), a trusted certificate is required at both the OPC UA server and the VTScada OPC UA Client driver to verify identity.

Unlike many other drivers, the OPC UA Client does not use a Port tag to communicate with its device (OPC UA server). Due to the nature of the binary protocol, the OPC UA Client has port handling built-in.

If VTScada and the UA server are out of time synchronization by more than 5 minutes, the connection will not be made. The driver will return a 520 error, indicating a large time differential.

The OPC UA Client Driver Statistics Dialog widget provides an "Endpoints" button, which when pressed, will display the list of OPC UA Server Endpoint information that is retrieved by the driver and held internally. This information may be helpful when trying to diagnose connection issues or user authentication problems.

Importing tags from an OPC UA device

Not all OPCUA nodes are considered to be tags, so not all can be imported. The Tag Browser's Import tool will place properties of tags inside the I/O tag where possible instead of bringing them in as separate IO tags.

If the latter functionality is desired, the user will have to create their own independent I/O tags for this purpose.

Importing tags with the same display name is not supported. It is recommended that you review your tag structures and make sure no duplicates exist before attempting to import.

Server List

Select (or create) a named server list. (Driver Server Lists) Servers for the list must be defined using the Application Configuration dialog, as described in Servers for Specific Services. Smaller sites that do not have multiple servers, or that use only the default server list, need not configure this field.

OPC UA Client Driver properties Connection tab

Use this tab to supply the address of the server.

Endpoint URL

The address of a server using the OPC UA binary encoding is known as an Endpoint URL and is expressed as:

opc.tcp://server:port/path

(see: Server Addressing in the topic, OPC UA Addressing)

Connection Security

Select the type of transport security to be used between the VTScada OPC UA Client driver and the OPC UA server.

Enforce Secure Connection

Always connect using the most secure endpoint available (excludes None).

Prefer Secure Connection

Connect using the most secure endpoint available but allow fallback to None as a last resort.

Use Unsecure Connection

Strictly connect using the "None" security policy. If unavailable, the connection will fail.

The "None" security policy permits communication without encryption or message signing (no confidentiality or integrity). This should only be selected for testing or when the connection is otherwise protected by external means, such as a VPN between the VTScada system and the OPC UA server.
Where encryption or cryptographic signing of communication is desired (recommended), a trusted certificate is required at both the OPC UA server and the VTScada OPC UA Client driver to verify identity.

Hold

Select this to have I/O tags attached to the driver hold their last value in the event of a communication failure. If not selected, tags will have their value set to invalid on a communication failure.

 

OPC UA Client Driver properties Authentication tab

Refer to OPC UA Support & Security for more detail on required security configuration.

Fields within this tab are enabled according to your selection of authentication method:

Anonymous

When authentication is set to Anonymous, no other fields are enabled.

Anonymous Authentication option for OPC UA

Username

Username and Password fields are enabled.

Username and Password Authetication option for OPC UA Client

Certificate

'Select a certificate...' drop-down and 'Manage Certificates' button are enabled.

Certificate Authetication option for OPC UA Client

The 'Select a certificate...' droplist displays a list of available certificates in the current user's Personal Windows certificate store. Selecting the 'Manage Certificates' button will load the Certificate Management UI, where the user may add, update, delete or renew certificates.

If the certificate selected is set to expire in less than 30 days, the expiry date text in the 'Valid To' field will be orange in color and red if it has expired.

Certificates created through the Certificate Management UI will also have an automatically created URL and DNS entry. The URL is derived from the application GUID, making it unique to your instance of VTScada. The DNS entry contains the host name of the workstation on which you are creating this certificate (not the fully qualified domain name (FQDN)). These are used visibly in the certificate's Subject Alternative Names (SAN).

OPC UA Client Driver properties Client Certificate tab

Refer to OPC UA Support & Security for more detail on required security configuration.

Contains a 'Select a certificate...' drop-down, fields for basic information of the selected certificate and a 'Manage Certificates' button.

Use this to choose the certificate that the OPC UA Client will supply to the server for transport security. It displays only valid certificates of the appropriate extended key usage type (that is, suitable for client authentication) that are in the current user’s Trihedral OPC UA Client certificate store. That certificate store is created by the OPC UA Driver for this purpose.

Client certificate selected appearance

OPC UA Client Driver properties Server Certificate tab

Refer to OPC UA Support & Security for more detail on required security configuration.

Server Certificate tab of OPC UA Property Dialog

This tab holds a pair of certificate grids showing trusted and untrusted server-supplied transport security certificates, if any (See: Certificate Management UI). The certificates displayed are those in the current user’s Trihedral OPC UA Trusted and Trihedral OPC UA Untrusted certificate stores.

The server provides its certificate during establishment of a connection with the client. The OPC UA Client will only allow the connection to be established if the certificate is trusted (See Certificate Error Messages for issues that may arise).

If the server’s certificate is derived from a trusted certificate authority (in other words, there is a complete chain of trust from the server’s certificate through any intermediate certificates to the trusted certificate authority’s certificate), the certificate will be automatically trusted and not placed in either of these stores.

If the server certificate is not trusted by virtue of such a chain of trust and is not in the Trihedral OPC UA Trusted certificate store, it is automatically placed in the Trihedral OPC UA Untrusted store and appears in this tab’s Untrusted Certificates grid. From there you can elect to trust that certificate, using the Add Trust button. This will remove the certificate from the Untrusted Certificates and place it in the Trusted Certificates grid (and corresponding store).

If the OPC UA Client trusts the server’s transport certificate, via either of the above two methods, then the OPC UA Client will allow a connection to the server to be established.

OPC UA Client Driver properties Diagnostics tab

On startup, the OPC UA Client reads certain status and other information from the server. This tab displays the most recent information and provides a button to allow the data to be refreshed. The data is only available when there is a good connection to the server.

There is also a check box that allows an unsecured, unencrypted transport connection to be made to the server (if the server permits such a connection) for debugging purposes. The state of the check box always reverts to unchecked when the driver is reloaded (typically on restart of the application). After selecting or deselecting the check box, use the Restart Driver button to cause the OPC UA Client to disconnect and reconnect to the server, thereby switching between secure and unsecured communication.