{"id":244453,"date":"2024-10-19T16:03:38","date_gmt":"2024-10-19T16:03:38","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-62541-62015\/"},"modified":"2024-10-25T11:02:46","modified_gmt":"2024-10-25T11:02:46","slug":"bs-en-62541-62015","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-62541-62015\/","title":{"rendered":"BS EN 62541-6:2015"},"content":{"rendered":"
This part of IEC 62541 specifies the OPC Unified Architecture (OPC UA) mapping between the security model described in IEC TR 62541-2, the abstract service definitions, described in IEC 62541-4, the data structures defined in IEC 62541-5 and the physical network protocols that can be used to implement the OPC UA specification.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
4<\/td>\n | Foreword Endorsement notice <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | Annex ZA (normative) Normative references to international publications with their corresponding European publications <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | English CONTENTS <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 3 Terms, definitions, abbreviations and symbols 3.1 Terms and definitions 3.2 Abbreviations and symbols <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 4 Overview <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5 Data encoding 5.1 General 5.1.1 Overview 5.1.2 Built-in Types Figures Figure 1 \u2013 The OPC UA Stack Overview <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.1.3 Guid Tables Table 1 \u2013 Built-in Data Types Table 2 \u2013 Guid structure <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.1.4 ByteString 5.1.5 ExtensionObject` 5.1.6 Variant <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.2 OPC UA Binary 5.2.1 General 5.2.2 Built-in Types Figure 2 \u2013 Encoding Integers in a binary stream <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Figure 3 \u2013 Encoding Floating Points in a binary stream Figure 4 \u2013 Encoding Strings in a binary stream Table 3 \u2013 Supported Floating Point Types <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Figure 5 \u2013 Encoding Guids in a binary stream <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Figure 6 \u2013 Encoding XmlElements in a binary stream Table 4 \u2013 NodeId components Table 5 \u2013 NodeId DataEncoding values Table 6 \u2013 Standard NodeId Binary DataEncoding <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Figure 7 \u2013 A String NodeId Figure 8 \u2013 A Two Byte NodeId Table 7 \u2013 Two Byte NodeId Binary DataEncoding Table 8 \u2013 Four Byte NodeId Binary DataEncoding <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Figure 9 \u2013 A Four Byte NodeId Table 9 \u2013 ExpandedNodeId Binary DataEncoding <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Table 10 \u2013 DiagnosticInfo Binary DataEncoding Table 11 \u2013 QualifiedName Binary DataEncoding Table 12 \u2013 LocalizedText Binary DataEncoding <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Table 13 \u2013 Extension Object Binary DataEncoding <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Table 14 \u2013 Variant Binary DataEncoding <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 5.2.3 Enumerations 5.2.4 Arrays 5.2.5 Structures Table 15 \u2013 Data Value Binary DataEncoding <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 5.2.6 Messages 5.3 XML 5.3.1 Built-in Types Table 16 \u2013 Sample OPC UA Binary Encoded structure <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Table 17 \u2013 XML Data Type Mappings for Integers Table 18 \u2013 XML Data Type Mappings for Floating Points <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Table 19 \u2013 Components of NodeId <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Table 20 \u2013 Components of ExpandedNodeId <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 5.3.2 Enumerations 5.3.3 Arrays 5.3.4 Structures Table 21 \u2013 Components of Enumeration <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 5.3.5 Messages 6 Message SecurityProtocols 6.1 Security handshake Figure 10 \u2013 Security handshake <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 6.2 Certificates 6.2.1 General Table 22 \u2013 SecurityPolicy <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 6.2.2 Application Instance Certificate 6.2.3 Signed Software Certificate Table 23 \u2013 ApplicationInstanceCertificate <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 6.3 Time synchronization 6.4 UTC and International Atomic Time (TAI) Table 24 \u2013 SignedSoftwareCertificate <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 6.5 Issued User Identity Tokens \u2013 Kerberos 6.6 WS Secure Conversation 6.6.1 Overview Table 25 \u2013 Kerberos UserTokenPolicy <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Figure 11 \u2013 Relevant XML Web Services specifications Figure 12 \u2013 The WS Secure Conversation handshake <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 6.6.2 Notation 6.6.3 Request Security Token (RST\/SCT) Table 26 \u2013 WS-* Namespace prefixes <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 6.6.4 Request Security Token Response (RSTR\/SCT) Table 27 \u2013 RST\/SCT Mapping to an OpenSecureChannel Request <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 6.6.5 Using the SCT 6.6.6 Cancelling Security contexts Table 28 \u2013 RSTR\/SCT Mapping to an OpenSecureChannel Response <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 6.7 OPC UA Secure Conversation 6.7.1 Overview 6.7.2 MessageChunk structure Figure 13 \u2013 OPC UA Secure Conversation MessageChunk <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | Table 29 \u2013 OPC UA Secure Conversation Message header Table 30 \u2013 Asymmetric algorithm Security header <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | Table 31 \u2013 Symmetric algorithm Security header Table 32 \u2013 Sequence header <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 6.7.3 MessageChunks and error handling Table 33 \u2013 OPC UA Secure Conversation Message footer <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 6.7.4 Establishing a SecureChannel Table 34 \u2013 OPC UA Secure Conversation Message abort body Table 35 \u2013 OPC UA Secure Conversation OpenSecureChannel Service <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 6.7.5 Deriving keys <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 6.7.6 Verifying Message Security Table 36 \u2013 Cryptography key generation parameters <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 7 Transport Protocols 7.1 OPC UA TCP 7.1.1 Overview 7.1.2 Message structure Table 37 \u2013 OPC UA TCP Message header <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | Table 38 \u2013 OPC UA TCP Hello Message Table 39 \u2013 OPC UA TCP Acknowledge Message <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 7.1.3 Establishing a connection Figure 14 \u2013 OPC UA TCP Message structure Table 40 \u2013 OPC UA TCP Error Message <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 7.1.4 Closing a connection Figure\u00a015 \u2013 Establishing a OPC UA TCP connection Figure 16 \u2013 Closing a OPC UA TCP connection <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 7.1.5 Error handling 7.1.6 Error recovery Table 41 \u2013 OPC UA TCP error codes <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | Figure\u00a017 \u2013 Recovering an OPC UA TCP connection <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 7.2 SOAP\/HTTP 7.2.1 Overview 7.2.2 XML Encoding Table 42 \u2013 WS-Addressing headers <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 7.2.3 OPC UA Binary Encoding 7.3 HTTPS 7.3.1 Overview <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | Figure\u00a018 \u2013 Scenarios for the HTTPS Transport <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 7.3.2 XML Encoding <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 7.3.3 OPC UA Binary Encoding 7.4 Well known addresses Table 43 \u2013 Well known addresses for Local Discovery Servers <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 8 Normative Contracts 8.1 OPC Binary Schema 8.2 XML Schema and WSDL <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | Annexes Annex A (normative) Constants A.1 Attribute Ids A.2 Status Codes A.3 Numeric Node Ids Table A.1 \u2013 Identifiers assigned to Attributes <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | Annex B (normative) OPC UA Nodeset <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | Annex C (normative) Type declarations for the OPC UA native Mapping <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | Annex D (normative) WSDL for the XML Mapping D.1 XML Schema D.2 WDSL Port Types D.3 WSDL Bindings <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | Annex E (normative) Security settings management E.1 Overview <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | E.2 SecuredApplication <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | Table E.1 \u2013 SecuredApplication <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | E.3 CertificateIdentifier Table E.2 \u2013 CertificateIdentifier <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | Table E.3 \u2013 Structured directory store <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | E.4 CertificateStoreIdentifier E.5 CertificateList E.6 CertificateValidationOptions Table E.4 \u2013 CertificateStoreIdentfier Table E.5 \u2013 CertificateList <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | Table E.6 \u2013 CertificateValidationOptions <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | Annex F (normative) Information Model XML Schema F.1 Overview F.2 UANodeSet Table F.1 \u2013 UANodeSet <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | F.3 UANode F.4 Reference Table F.2 \u2013 UANode <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | F.5 UAType F.6 UAInstance F.7 UAVariable Table F.3 \u2013 Reference Table F.4 \u2013 UANodeSet Type Nodes Table F.5 \u2013 UANodeSet Instance Nodes Table F.6 \u2013 UAInstance <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | F.8 UAMethod F.9 TranslationType Table F.7 \u2013 UAVariable Table F.8 \u2013 UAMethod <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | F.10 UADataType F.11 DataTypeDefinition Table F.9 \u2013 TranslationType Table F.10 \u2013 UADataType <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | F.12 DataTypeField F.13 Variant Table F.11 \u2013 DataTypeDefinition Table F.12 \u2013 DataTypeField <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | F.14 Example (Informative) <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" OPC unified architecture – Mappings<\/b><\/p>\n |