How Gousto reduces food waste and increases workforce productivity: Watch on-demand. >
Explore core components that ensure scalability and performance for multi-site, multi-national industrial companies.
Exchange data using the built-in security of connection protocols. Authenticate users and their roles through thirdparty identity providers with Security Assertion Markup Language (SAML) and Windows Active Directory (LDAP). Securely move project configurations across environments with different connection credentials using external secrets support and the dedicated configuration construct for secure secret referencing.
Import and export JSON-based configuration files between Intelligence Hub and third-party sources within the browser-based configuration UI. Share configurations at the connection, condition, model, instance, flow, pipeline, and tag level. Dynamically drive template definitions from third-party sources and uniquely trigger flows for each asset, enabling replication of common datasets across assets without needing to templatize in the Intelligence Hub.
Create unique usernames and passwords for each user. Assign a user to a role with a pre-defined set of permission claims or assign a user their own unique permission claims. Use Active Directory to manage authentication, authorization of users, and application settings. Create and maintain certificates in the hub configuration to authenticate and secure data transfer with other systems.
Connect multiple hubs to a single host that acts as the central hub. Once connected, administrators can log in to the central hub and easily switch between hubs to configure and monitor individual hub activity and compare configurations for differences. Administrators can also synchronize models, connections, or complete projects between hubs.
Enable audit logging to allow all configuration creations, modifications, or deletions to be logged to the event log as AUDIT type events. View all log events through the configuration and filter by type, source, or message text. Automatically back up the runtime’s configuration file to a backup directory at a specified frequency and maintain a specified maximum number of these files.
Deploy redundant Intelligence Hubs for critical data and pair the hubs as a primary and secondary. A secondary hub will be ready in a warm state ready to enable flows when it detects the primary is no longer responding.
The Intelligence Hub includes tags to define ad hoc collections of items in the configuration. These tags can easily be used to identify configuration related to a use case or a section of the factory or to limit permissions to specific people. The tags enable easy grouping to filter the UI, synchronize across hubs, and grant permissions within a hub.
Switch between multi-hub and single-hub views
Synchronize models, connections, or complete projects between hubs
Enable tag-based grouping to filter the UI, synchronize across hubs, and grant permissions
Identify outputs by connection to implement high-level security
Use SAML to authenticate users and their roles through third party identity providers
Assign users to roles with predefined and/or unique permissions claims
Replicate third-party-sourced templates to similar assets
Manage authentication, authorization of users, and application settings
Enable auditing by logging and labeling configuration creations, modifications, or deletions
Automatically back up the runtime configuration file to a backup directory
Deploy redundant Intelligence Hubs to minimize interruptions
Export and import full or partial project configurations defined by either the Intelligence Hub or external sources
Join the free trial program to get hands-on access to all the features and functionality within HighByte Intelligence Hub and start testing the software in your unique environment.