IEC 62541-7:2020
(Main)OPC Unified Architecture - Part 7: Profiles
OPC Unified Architecture - Part 7: Profiles
IEC 62541-7:2020 defines the OPC Unified Architecture (OPC UA) Profiles. The Profiles in this document are used to segregate features with regard to testing of OPC UA products and the nature of the testing (tool based or lab based). This includes the testing performed by the OPC Foundation provided OPC UA CTT (a self-test tool) and by the OPC Foundation provided Independent certification test labs. This could equally as well refer to test tools provided by another organization or a test lab provided by another organization. What is important is the concept of automated tool-based testing versus lab-based testing. The scope of this standard includes defining functionality that can only be tested in a lab and defining the grouping of functionality that is to be used when testing OPC UA products either in a lab or using automated tools. The definition of actual TestCases is not within the scope of this document, but the general categories of TestCases are within the scope of this document.
Most OPC UA applications will conform to several, but not all, of the Profiles.
This third edition cancels and replaces the second edition published in 2015. This edition constitutes a technical revision.
This edition includes the following significant technical changes with respect to the previous edition:
a) new functional Profiles:
• profiles for global discovery and global certificate management;
• profiles for global KeyCredential management and global access token management;
• facet for durable subscriptions;
• standard UA Client Profile;
• profiles for administration of user roles and permissions.
b) new transport Profiles:
• HTTPS with JSON encoding;
• secure WebSockets (WSS) with binary or JSON encoding;
• reverse connectivity.
c) new security Profiles:
• transportSecurity – TLS 1.2 with PFS (with perfect forward secrecy);
• securityPolicy [A] – Aes128-Sha256-RsaOaep (replaces Base128Rsa15);
• securityPolicy – Aes256-Sha256-RsaPss adds perfect forward secrecy for UA TCP);
• user Token JWT (Jason Web Token).
d) deprecated Security Profiles (due to broken algorithms):
• securityPolicy – Basic128Rsa15 (broken algorithm Sha1);
• securityPolicy – Basic256 (broken algorithm Sha1);
• transportSecurity – TLS 1.0 (broken algorithm RC4);
• transportSecurity – TLS 1.1 (broken algorithm RC4).
e) deprecated Transport (missing support on most platforms):
• SOAP/HTTP with WS-SecureConversation (all encodings).
Architecture unifiée OPC - Partie 7: Profils
L'IEC 62541-7:2020 définit les Profils de l'architecture unifiée OPC (OPC UA). Les Profils du présent document permettent de classer les caractéristiques en fonction des essais de produits OPC UA et de la nature des essais (via un outil ou en laboratoire). Cela inclut les essais effectués à l'aide de l'outil d'essai de conformité CTT OPC UA développé par la Fondation OPC (outil d'essai autonome), ainsi que les essais réalisés par des laboratoires de certification indépendants de cette même fondation. Le présent document peut également faire référence aux outils d'essai ou au laboratoire d'essai d'un autre organisme. Dans le cas présent, l'élément important est le concept qui oppose les essais fondés sur un outil automatisé et les essais en laboratoire. Le domaine d'application de la présente norme inclut la définition d'une fonctionnalité qui ne peut être soumise à l'essai qu'en laboratoire, ainsi que la définition du regroupement des fonctionnalités à utiliser durant les essais de produits OPC UA effectués en laboratoire ou à l'aide d'outils automatisés. La définition des TestCases réels ne relève pas du domaine d'application du présent document, mais les catégories de TestCases générales relèvent du domaine d'application du présent document.
La plupart des applications OPC UA sont conformes à plusieurs Profils, mais pas à l'ensemble des Profils.
Cette troisième édition annule et remplace la deuxième édition parue en 2015. Cette édition constitue une révision technique.
Cette édition inclut les modifications techniques majeures suivantes par rapport à l'édition précédente:
a) ajout de nouveaux profils fonctionnels:
• profils pour la découverte globale et la gestion globale des certificats;
• profils pour la gestion globale de KeyCredential et pour la gestion globale des jetons d'accès;
• facette pour les abonnements durables;
• profil client UA normalisé;
• profils pour l'administration des rôles et permissions des utilisateurs.
b) ajout de nouveaux profils de transport:
• HTTPS avec codage JSON;
• Secure WebSockets (WSS) avec codage binaire ou JSON;
• connectivité inversée.
c) ajout de nouveaux profils de sécurité:
• TransportSecurity – TLS 1.2 avec PFS (confidentialité persistante);
• SecurityPolicy [A] – Aes128-Sha256-RsaOaep (en remplacement de Base128Rsa15);
• SecurityPolicy – Aes256-Sha256-RsaPss ajoute la confidentialité persistante pour UA TCP);
• jeton d'utilisateur JWT (Jason Web Token).
d) spécification des profils de sécurité déconseillés (en raison des algorithmes cassés):
• SecurityPolicy – Basic128Rsa15 (algorithme Sha1 cassé);
• SecurityPolicy – Basic256 (algorithme Sha1 cassé);
• TransportSecurity – TLS 1.0 (algorithme RC4 cassé);
• TransportSecurity – TLS 1.1 (algorithme RC4 cassé).
e) transport déconseillé (absence de prise en charge sur la plupart des plateformes):
• SOAP/HTTP avec WS-SecureConversation (tous les codages).
General Information
Relations
Overview
IEC 62541-7:2020 - "OPC Unified Architecture – Part 7: Profiles" defines the Profiles used to group OPC UA features for conformance and testing. The standard separates feature sets into testable units (ConformanceUnits) and specifies which functionality can be validated by automated tool-based testing (for example the OPC Foundation’s OPC UA CTT) versus lab-based testing performed by independent test labs. This third edition (2020) replaces the 2015 edition and is a technical revision that updates profiles, transports and security recommendations.
Key Topics and Requirements
- Profiles and ConformanceUnits: Defines how OPC UA features are grouped to support consistent conformance testing and reporting.
- Test scope: Distinguishes automated tool tests from lab-only tests; includes general categories of TestCases (but not the detailed TestCases themselves).
- New functional profiles (2020): global discovery, global certificate management, KeyCredential and access token management, durable subscriptions facet, standard UA Client profile, and user role/permission administration profiles.
- New transport profiles: HTTPS with JSON encoding, secure WebSockets (WSS) with binary or JSON encoding, and reverse connectivity.
- Updated security profiles: support for TLS 1.2 with PFS, improved securityPolicy algorithms (e.g., Aes128-Sha256-RsaOaep; Aes256-Sha256-RsaPss), and JWT user tokens.
- Deprecations: Older, broken algorithms and transports (Basic128Rsa15, Basic256, TLS 1.0/1.1, SOAP/HTTP with WS-SecureConversation) are deprecated due to known vulnerabilities or lack of platform support.
- Profile versioning and conventions: rules for defining and evolving profiles to maintain interoperability across releases.
Practical Applications - Who Uses IEC 62541-7
- Product vendors and developers: determine which OPC UA features to implement to meet specific profiles and to plan automated vs lab testing.
- QA and certification labs: design test plans and scope certification activities based on profile groupings and ConformanceUnits.
- System integrators and asset owners: select OPC UA servers/clients that conform to required profiles for interoperability and security.
- Cybersecurity engineers: use the security profile recommendations to enforce modern cryptography and deprecate weak algorithms.
- Tool providers: build or update automated conformance tools (like OPC UA CTT alternatives) aligned with the profile definitions.
Related Standards
- IEC 62541 series (OPC UA core specifications, services, information models) - Part 7 complements other parts by prescribing how features are grouped and tested for conformance and interoperability.
Keywords: IEC 62541-7, OPC UA Profiles, OPC Unified Architecture, conformance testing, OPC UA CTT, lab-based testing, automated testing, security profiles, transport profiles, durable subscriptions.
Standards Content (Sample)
IEC 62541-7 ®
Edition 3.0 2020-06
REDLINE VERSION
INTERNATIONAL
STANDARD
colour
inside
OPC unified architecture –
Part 7: Profiles
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form
or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from
either IEC or IEC's member National Committee in the country of the requester. If you have any questions about IEC
copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or
your local IEC member National Committee for further information.
IEC Central Office Tel.: +41 22 919 02 11
3, rue de Varembé info@iec.ch
CH-1211 Geneva 20 www.iec.ch
Switzerland
About the IEC
The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes
International Standards for all electrical, electronic and related technologies.
About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigendum or an amendment might have been published.
IEC publications search - webstore.iec.ch/advsearchform Electropedia - www.electropedia.org
The advanced search enables to find IEC publications by a The world's leading online dictionary on electrotechnology,
variety of criteria (reference number, text, technical containing more than 22 000 terminological entries in English
committee,…). It also gives information on projects, replaced and French, with equivalent terms in 16 additional languages.
and withdrawn publications. Also known as the International Electrotechnical Vocabulary
(IEV) online.
IEC Just Published - webstore.iec.ch/justpublished
Stay up to date on all new IEC publications. Just Published IEC Glossary - std.iec.ch/glossary
details all new publications released. Available online and 67 000 electrotechnical terminology entries in English and
once a month by email. French extracted from the Terms and Definitions clause of
IEC publications issued since 2002. Some entries have been
IEC Customer Service Centre - webstore.iec.ch/csc collected from earlier publications of IEC TC 37, 77, 86 and
If you wish to give us your feedback on this publication or CISPR.
need further assistance, please contact the Customer Service
Centre: sales@iec.ch.
IEC 62541-7 ®
Edition 3.0 2020-06
REDLINE VERSION
INTERNATIONAL
STANDARD
colour
inside
OPC unified architecture –
Part 7: Profiles
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
ICS 25.040.40; 35.100.05 ISBN 978-2-8322-8562-6
– 2 – IEC 62541-7:2020 RLV © IEC 2020
CONTENTS
FOREWORD . 12
1 Scope . 15
2 Normative references . 15
3 Terms, definitions, and conventions abbreviated terms . 16
3.1 Terms and definitions . 16
3.2 Abbreviated terms . 17
4 Overview . 17
4.1 General . 17
4.2 ConformanceUnit . 18
4.3 Profiles . 18
4.4 Profile Categories . 19
5 Conformance Units . 19
5.1 Overview. 19
5.2 Services . 20
5.3 Transport and communication related features . 30
5.4 Information Model and AddressSpace related features . 42
5.5 Miscellaneous . 62
6 Profiles . 64
6.1 Overview. 64
6.2 Profile list . 64
6.3 Conventions for Profile definitions . 71
6.4 Profile versioning . 71
6.5 Applications . 71
6.6 Profile tables . 73
6.6.1 General . 73
6.6.2 Core Server Facet . 73
6.6.3 Core 2017 Server Facet . 73
6.6.4 Sessionless Server Facet . 74
6.6.5 Reverse Connect Server Facet . 75
6.6.6 Base Server Behaviour Facet . 75
6.6.7 Request State Change Server Facet . 75
6.6.8 Subnet Discovery Server Facet . 75
6.6.9 Global Certificate Management Server Facet . 76
6.6.10 Authorization Service Server Facet . 76
6.6.11 KeyCredential Service Server Facet . 76
6.6.12 Attribute WriteMask Server Facet . 76
6.6.13 File Access Server Facet . 77
6.6.14 Documentation Server Facet . 77
6.6.15 Embedded DataChange Subscription Server Facet . 77
6.6.16 Standard DataChange Subscription Server Facet . 78
6.6.17 Standard DataChange Subscription 2017 Server Facet . 78
6.6.18 Enhanced DataChange Subscription Server Facet . 78
6.6.19 Enhanced DataChange Subscription 2017 Server Facet . 78
6.6.20 Durable Subscription Server Facet . 79
6.6.21 Data Access Server Facet . 79
6.6.22 ComplexType Server Facet . 79
6.6.23 ComplexType 2017 Server Facet . 80
6.6.24 Standard Event Subscription Server Facet . 80
6.6.25 Address Space Notifier Server Facet . 81
6.6.26 A & C Base Condition Server Facet . 81
6.6.27 A & C Refresh2 Server Facet . 82
6.6.28 A & C Address Space Instance Server Facet . 82
6.6.29 A & C Enable Server Facet . 82
6.6.30 A & C AlarmMetrics Server Facet . 82
6.6.31 A & C Alarm Server Facet . 83
6.6.32 A & C Acknowledgeable Alarm Server Facet . 83
6.6.33 A & C Exclusive Alarming Server Facet . 84
6.6.34 A & C Non-Exclusive Alarming Server Facet . 84
6.6.35 A & C Previous Instances Server Facet . 84
6.6.36 A & C Dialog Server Facet . 85
6.6.37 A & C CertificateExpiration Server Facet . 85
6.6.38 A & E Wrapper Facet . 85
6.6.39 Method Server Facet . 86
6.6.40 Auditing Server Facet . 86
6.6.41 Node Management Server Facet. 87
6.6.42 User Role Base Server Facet . 87
6.6.43 User Role Management Server Facet . 87
6.6.44 State Machine Server Facet . 88
6.6.45 Client Redundancy Server Facet . 88
6.6.46 Redundancy Transparent Server Facet . 88
6.6.47 Redundancy Visible Server Facet . 89
6.6.48 Historical Raw Data Server Facet . 89
6.6.49 Historical Aggregate Server Facet . 89
6.6.50 Historical Data AtTime Server Facet . 90
6.6.51 Historical Access Modified Data Server Facet . 91
6.6.52 Historical Annotation Server Facet . 91
6.6.53 Historical Data Insert Server Facet . 91
6.6.54 Historical Data Update Server Facet . 91
6.6.55 Historical Data Replace Server Facet . 92
6.6.56 Historical Data Delete Server Facet . 92
6.6.57 Historical Access Structured Data Server Facet . 92
6.6.58 Base Historical Event Server Facet . 92
6.6.59 Historical Event Update Server Facet . 93
6.6.60 Historical Event Replace Server Facet . 93
6.6.61 Historical Event Insert Server Facet . 93
6.6.62 Historical Event Delete Server Facet . 93
6.6.63 Aggregate Subscription Server Facet . 94
6.6.64 Nano Embedded Device Server Profile . 95
6.6.65 Nano Embedded Device 2017 Server Profile . 95
6.6.66 Micro Embedded Device Server Profile . 95
6.6.67 Micro Embedded Device 2017 Server Profile . 95
6.6.68 Embedded UA Server Profile . 95
6.6.69 Embedded 2017 UA Server Profile . 96
6.6.70 Standard UA Server Profile . 96
6.6.71 Standard 2017 UA Server Profile . 96
– 4 – IEC 62541-7:2020 RLV © IEC 2020
6.6.72 Core Client Facet. 97
6.6.73 Core 2017 Client Facet . 97
6.6.74 Sessionless Client Facet . 98
6.6.75 Reverse Connect Client Facet . 98
6.6.76 Base Client Behaviour Facet . 98
6.6.77 Discovery Client Facet . 98
6.6.78 Subnet Discovery Client Facet . 99
6.6.79 Global Discovery Client Facet . 99
6.6.80 Global Certificate Management Client Facet . 99
6.6.81 KeyCredential Service Client Facet . 99
6.6.82 Access Token Request Client Facet . 100
6.6.83 AddressSpace Lookup Client Facet . 100
6.6.84 Request State Change Client Facet . 100
6.6.85 File Access Client Facet . 101
6.6.86 Entry-Level Support 2015 Client Facet. 101
6.6.87 Multi-Server Client Connection Facet . 101
6.6.88 Documentation – Client . 101
6.6.89 Attribute Read Client Facet . 102
6.6.90 Attribute Write Client Facet . 102
6.6.91 DataChange Subscriber Client Facet . 102
6.6.92 Durable Subscription Client Facet . 103
6.6.93 DataAccess Client Facet . 103
6.6.94 Event Subscriber Client Facet. 104
6.6.95 Base Event Processing Client Facet . 104
6.6.96 Notifier and Source Hierarchy Client Facet . 105
6.6.97 A & C Base Condition Client Facet . 105
6.6.98 A & C Refresh2 Client Facet . 105
6.6.99 A & C Address Space Instance Client Facet . 106
6.6.100 A & C Enable Client Facet . 106
6.6.101 A & C AlarmMetrics Client Facet . 106
6.6.102 A & C Alarm Client Facet . 106
6.6.103 A & C Exclusive Alarming Client Facet . 107
6.6.104 A & C Non-Exclusive Alarming Client Facet . 107
6.6.105 A & C Previous Instances Client Facet . 108
6.6.106 A & C Dialog Client Facet . 108
6.6.107 A & C CertificateExpiration Client Facet . 108
6.6.108 A & E Proxy Facet . 109
6.6.109 Method Client Facet. 110
6.6.110 Auditing Client Facet . 110
6.6.111 Node Management Client Facet . 110
6.6.112 Advanced Type Programming Client Facet . 110
6.6.113 User Role Management Client Facet . 111
6.6.114 State Machine Client Facet . 111
6.6.115 Diagnostic Client Facet . 111
6.6.116 Redundant Client Facet . 112
6.6.117 Redundancy Switch Client Facet . 112
6.6.118 Historical Access Client Facet . 112
6.6.119 Historical Data AtTime Client Facet . 112
6.6.120 Historical Aggregate Client Facet . 112
6.6.121 Historical Annotation Client Facet . 114
6.6.122 Historical Access Modified Data Client Facet . 114
6.6.123 Historical Data Insert Client Facet . 114
6.6.124 Historical Data Update Client Facet . 114
6.6.125 Historical Data Replace Client Facet. 114
6.6.126 Historical Data Delete Client Facet . 115
6.6.127 Historical Access Client Server Timestamp Facet . 115
6.6.128 Historical Structured Data Access Client Facet . 115
6.6.129 Historical Structured Data AtTime Client Facet . 115
6.6.130 Historical Structured Data Modified Client Facet . 116
6.6.131 Historical Structured Data Insert Client Facet . 116
6.6.132 Historical Structured Data Update Client Facet . 116
6.6.133 Historical Structured Data Replace Client Facet . 116
6.6.134 Historical Structured Data Delete Client Facet . 116
6.6.135 Historical Events Client Facet . 117
6.6.136 Historical Event Insert Client Facet . 117
6.6.137 Historical Event Update Client Facet. 117
6.6.138 Historical Event Replace Client Facet . 117
6.6.139 Historical Event Delete Client Facet . 118
6.6.140 Aggregate Subscriber Client Facet . 118
6.6.141 Standard UA Client Profile . 119
6.6.142 Standard UA Client 2017 Profile . 119
6.6.143 UA-TCP UA-SC UA-Binary. 120
6.6.144 HTTPS UA-Binary . 120
6.6.145 HTTPS UA-XML . 121
SOAP-HTTP WS-SC UA XML .
SOAP-HTTP WS-SC UA Binary .
SOAP-HTTP WS-SC UA XML-UA Binary .
6.6.146 HTTPS UA-JSON. 121
6.6.147 WSS UA-SC UA-Binary. 122
6.6.148 WSS UA-JSON . 122
6.6.149 Security User Access Control Full . 122
6.6.150 Security User Access Control Base. 123
6.6.151 Security Time Synchronization . 123
6.6.152 Best Practice – Audit Events . 123
6.6.153 Best Practice – Alarm Handling . 123
6.6.154 Best Practice – Random Numbers . 124
6.6.155 Best Practice – Timeouts . 124
6.6.156 Best Practice – Administrative Access . 124
6.6.157 Best Practice – Strict Message Handling . 124
6.6.158 Best Practice – Audit Events Client . 125
TransportSecurity – TLS 1.0 .
TransportSecurity – TLS 1.1 .
6.6.159 TransportSecurity – TLS 1.2 . 126
6.6.160 TransportSecurity – TLS 1.2 with PFS . 126
6.6.161 SecurityPolicy – None . 126
6.6.162 SecurityPolicy – Basic128Rsa15 . 127
6.6.163 SecurityPolicy – Basic256 . 127
6.6.164 SecurityPolicy [A] – Aes128-Sha256-RsaOaep . 128
– 6 – IEC 62541-7:2020 RLV © IEC 2020
6.6.165 SecurityPolicy [B] – Basic256Sha256 . 128
6.6.166 SecurityPolicy – Aes256-Sha256-RsaPss . 129
6.6.167 User Token – Anonymous Facet . 129
6.6.168 User Token – User Name Password Server Facet . 130
6.6.169 User Token – X509 Certificate Server Facet . 130
6.6.170 User Token – Issued Token Server Facet . 130
6.6.171 User Token – Issued Token Windows Server Facet . 130
6.6.172 User Token – JWT Server Facet . 131
6.6.173 User Token – User Name Password Client Facet . 131
6.6.174 User Token – X509 Certificate Client Facet . 131
6.6.175 User Token – Issued Token Client Facet . 131
6.6.176 User Token – Issued Token Windows Client Facet . 131
6.6.177 User Token – JWT Client Facet . 132
6.6.178 Global Discovery Server Profile . 132
6.6.179 Global Discovery Server 2017 Profile . 132
6.6.180 Global Discovery and Certificate Management Server. 132
6.6.181 Global Discovery and Certificate Mgmt 2017 Server . 133
6.6.182 Global Certificate Management Client Profile . 133
6.6.183 Global Certificate Management Client 2017 Profile . 133
6.6.184 Global Service Authorization Request Server Facet . 133
6.6.185 Global Service KeyCredential Pull Facet . 134
6.6.186 Global Service KeyCredential Push Facet . 134
Bibliography . 135
Figure 1 – Profile – ConformanceUnit – TestCases . 18
Figure 2 – HMI Client sample . 72
Figure 3 – Embedded Server sample . 72
Figure 4 – Standard UA Server sample . 73
Table 1 – Profile Categories . 19
Table 2 – Conformance Groups . 20
Table 3 – Discovery Services . 21
Table 4 – Session Services . 22
Table 5 – Node Management Services . 24
Table 6 – View Services . 24
Table 7 – Attribute Services . 25
Table 8 – Method Services . 26
Table 9 – Monitored Item Services . 27
Table 10 – Subscription Services . 29
Table 11 – Security . 31
Table 12 – Protocol and Encoding . 42
Table 13 – Base Information . 43
Table 14 – Address Space Model . 46
Table 15 – Data Access . 48
Table 16 – Alarms and Conditions . 49
Table 17 – Historical Access . 52
Table 18 – Aggregates . 55
Table 19 – Auditing . 61
Table 20 – Redundancy . 61
Table 21 – Global Discovery Server . 62
Table 22 – Miscellaneous . 63
Table 23 – Profile list . 65
Table 24 – Core 2017 Server Facet . 74
Table 25 – Sessionless Server Facet . 74
Table 26 – Reverse Connect Server Facet . 75
Table 27 – Base Server Behaviour Facet . 75
Table 28 – Request State Change Server Facet . 75
Table 29 – Subnet Discovery Server Facet . 75
Table 30 – Global Certificate Management Server Facet . 76
Table 31 – Authorization Service Server Facet . 76
Table 32 – KeyCredential Service Server Facet . 76
Table 33 – Attribute WriteMask Server Facet . 76
Table 34 – File Access Server Facet . 77
Table 35 – Documentation Server Facet . 77
Table 36 – Embedded DataChange Subscription Server Facet . 77
Table 37 – Standard DataChange Subscription 2017 Server Facet . 78
Table 38 – Enhanced DataChange Subscription 2017 Server Facet . 79
Table 39 – Durable Subscription Server Facet . 79
Table 40 – Data Access Server Facet . 79
Table 41 – ComplexType 2017 Server Facet . 80
Table 42 – Standard Event Subscription Server Facet . 81
Table 43 – Address Space Notifier Server Facet . 81
Table 44 – A & C Base Condition Server Facet . 82
Table 45 – A & C Refresh2 Server Facet . 82
Table 46 – A & C Address Space Instance Server Facet . 82
Table 47 – A & C Enable Server Facet . 82
Table 48 – A & C AlarmMetrics Server Facet . 83
Table 49 – A & C Alarm Server Facet . 83
Table 50 – A & C Acknowledgeable Alarm Server Facet . 84
Table 51 – A & C Exclusive Alarming Server Facet . 84
Table 52 – A & C Non-Exclusive Alarming Server Facet . 84
Table 53 – A & C Previous Instances Server Facet . 85
Table 54 – A & C Dialog Server Facet . 85
Table 55 – A & C CertificateExpiration Server Facet . 85
Table 56 – A & E Wrapper Facet . 86
Table 57 – Method Server Facet . 86
Table 58 – Auditing Server Facet . 87
Table 59 – Node Management Server Facet . 87
Table 60 – User Role Base Server Facet . 87
– 8 – IEC 62541-7:2020 RLV © IEC 2020
Table 61 – User Role Management Server Facet . 88
Table 62 – State Machine Server Facet . 88
Table 63 – Client Redundancy Server Facet . 88
Table 64 – Redundancy Transparent Server Facet. 88
Table 65 – Redundancy Visible Server Facet . 89
Table 66 – Historical Raw Data Server Facet . 89
Table 67 – Historical Aggregate Server Facet . 90
Table 68 – Historical Data AtTime Server Facet . 91
Table 69 – Historical Access Modified Data Server Facet . 91
Table 70 – Historical Annotation Server Facet . 91
Table 71 – Historical Data Insert Server Facet . 91
Table 72 – Historical Data Update Server Facet . 92
Table 73 – Historical Data Replace Server Facet . 92
Table 74 – Historical Data Delete Server Facet . 92
Table 75 – Historical Access Structured Data Server Facet. 92
Table 76 – Base Historical Event Server Facet . 93
Table 77 – Historical Event Update Server Facet . 93
Table 78 – Historical Event Replace Server Facet . 93
Table 79 – Historical Event Insert Server Facet . 93
Table 80 – Historical Event Delete Server Facet . 93
Table 81 – Aggregate Subscription Server Facet . 94
Table 82 – Nano Embedded Device 2017 Server Profile . 95
Table 83 – Micro Embedded Device 2017 Server Profile . 95
Table 84 – Embedded 2017 UA Server Profile . 96
Table 85 – Standard 2017 UA Server Profile . 97
Table 86 – Core 2017 Client Facet . 97
Table 87 – Sessionless Client Facet . 98
Table 88 – Reverse Connect Client Facet . 98
Table 89 – Base Client Behaviour Facet . 98
Table 90 – Discovery Client Facet. 99
Table 91 – Subnet Discovery Client Facet . 99
Table 92 – Global Discovery Client Facet . 99
Table 93 – Global Certificate Management Client Facet . 99
Table 94 – KeyCredential Service Client Facet . 100
Table 95 – Access Token Request Client Facet . 100
Table 96 – AddressSpace Lookup Client Facet . 100
Table 97 – Request State Change Client Facet . 100
Table 98 – File Access Client Facet . 101
Table 99 – Entry Level Support 2015 Client Facet . 101
Table 100 – Multi-Server Client Connection Facet . 101
Table 101 – Documentation – Client . 102
Table 102 – Attribute Read Client Facet. 102
Table 103 – Attribute Write Client Facet . 102
Table 104 – DataChange Subscriber Client Facet . 103
Table 105 – Durable Subscription Client Facet. 103
Table 106 – DataAccess Client Facet . 104
Table 107 – Event Subscriber Client Facet . 104
Table 108 – Base Event Processing Client Facet . 105
Table 109 – Notifier and Source Hierarchy Client Facet . 105
Table 110 – A & C Base Condition Client Facet . 105
Table 111 – A & C Refresh2 Client Facet . 106
Table 112 – A & C Address Space Instance Client Facet . 106
Table 113 – A & C Enable Client Facet . 106
Table 114 – A & C AlarmMetrics Client Facet . 106
Table 115 – A & C Alarm Client Facet . 107
Table 116 – A & C Exclusive Alarming Client Facet . 107
Table 117 – A & C Non-Exclusive Alarming Client Facet . 108
Table 118 – A & C Previous Instances Client Facet . 108
Table 119 – A & C Dialog Client Facet . 108
Table 120 – A & C CertificateExpiration Client Facet . 108
Table 121 – A & E Proxy Facet . 109
Table 122 – Method Client Facet . 110
Table 123 – Auditing Client Facet . 110
Table 124 – Node Management Client Facet . 110
Table 125 – Advanced Type Programming Client Facet . 111
Table 126 – User Role Management Client Facet . 111
Table 127 – State Machine Client Facet . 111
Table 128 – Diagnostic Client Facet . 111
Table 129 – Redundant Client Facet . 112
Table 130 – Redundancy Switch Client Facet . 112
Table 131 – Historical Access Client Facet . 112
Table 132 – Historical Data AtTime Client Facet . 112
Table 133 – Historical Aggregate Client Facet . 113
Table 134 – Historical Annotation Client Facet . 114
Table 135 – Historical Access Modified Data Client Facet .
...
IEC 62541-7 ®
Edition 3.0 2020-06
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
colour
inside
OPC unified architecture –
Part 7: Profiles
Architecture unifiée OPC –
Partie 7: Profils
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form
or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from
either IEC or IEC's member National Committee in the country of the requester. If you have any questions about IEC
copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or
your local IEC member National Committee for further information.
Droits de reproduction réservés. Sauf indication contraire, aucune partie de cette publication ne peut être reproduite
ni utilisée sous quelque forme que ce soit et par aucun procédé, électronique ou mécanique, y compris la photocopie
et les microfilms, sans l'accord écrit de l'IEC ou du Comité national de l'IEC du pays du demandeur. Si vous avez des
questions sur le copyright de l'IEC ou si vous désirez obtenir des droits supplémentaires sur cette publication, utilisez
les coordonnées ci-après ou contactez le Comité national de l'IEC de votre pays de résidence.
IEC Central Office Tel.: +41 22 919 02 11
3, rue de Varembé info@iec.ch
CH-1211 Geneva 20 www.iec.ch
Switzerland
About the IEC
The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes
International Standards for all electrical, electronic and related technologies.
About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigendum or an amendment might have been published.
IEC publications search - webstore.iec.ch/advsearchform Electropedia - www.electropedia.org
The advanced search enables to find IEC publications by a The world's leading online dictionary on electrotechnology,
variety of criteria (reference number, text, technical containing more than 22 000 terminological entries in English
committee,…). It also gives information on projects, replaced and French, with equivalent terms in 16 additional languages.
and withdrawn publications. Also known as the International Electrotechnical Vocabulary
(IEV) online.
IEC Just Published - webstore.iec.ch/justpublished
Stay up to date on all new IEC publications. Just Published IEC Glossary - std.iec.ch/glossary
details all new publications released. Available online and 67 000 electrotechnical terminology entries in English and
once a month by email. French extracted from the Terms and Definitions clause of
IEC publications issued since 2002. Some entries have been
IEC Customer Service Centre - webstore.iec.ch/csc collected from earlier publications of IEC TC 37, 77, 86 and
If you wish to give us your feedback on this publication or CISPR.
need further assistance, please contact the Customer Service
Centre: sales@iec.ch.
A propos de l'IEC
La Commission Electrotechnique Internationale (IEC) est la première organisation mondiale qui élabore et publie des
Normes internationales pour tout ce qui a trait à l'électricité, à l'électronique et aux technologies apparentées.
A propos des publications IEC
Le contenu technique des publications IEC est constamment revu. Veuillez vous assurer que vous possédez l’édition la
plus récente, un corrigendum ou amendement peut avoir été publié.
Recherche de publications IEC - Electropedia - www.electropedia.org
webstore.iec.ch/advsearchform Le premier dictionnaire d'électrotechnologie en ligne au
La recherche avancée permet de trouver des publications IEC monde, avec plus de 22 000 articles terminologiques en
en utilisant différents critères (numéro de référence, texte, anglais et en français, ainsi que les termes équivalents dans
comité d’études,…). Elle donne aussi des informations sur les 16 langues additionnelles. Egalement appelé Vocabulaire
projets et les publications remplacées ou retirées. Electrotechnique International (IEV) en ligne.
IEC Just Published - webstore.iec.ch/justpublished Glossaire IEC - std.iec.ch/glossary
Restez informé sur les nouvelles publications IEC. Just 67 000 entrées terminologiques électrotechniques, en anglais
Published détaille les nouvelles publications parues. et en français, extraites des articles Termes et Définitions des
Disponible en ligne et une fois par mois par email. publications IEC parues depuis 2002. Plus certaines entrées
antérieures extraites des publications des CE 37, 77, 86 et
Service Clients - webstore.iec.ch/csc CISPR de l'IEC.
Si vous désirez nous donner des commentaires sur cette
publication ou si vous avez des questions contactez-nous:
sales@iec.ch.
IEC 62541-7 ®
Edition 3.0 2020-06
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
colour
inside
OPC unified architecture –
Part 7: Profiles
Architecture unifiée OPC –
Partie 7: Profils
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
COMMISSION
ELECTROTECHNIQUE
INTERNATIONALE
ICS 25.040.40; 35.100.05 ISBN 978-2-8322-8456-8
– 2 – IEC 62541-7:2020 © IEC 2020
CONTENTS
FOREWORD . 12
1 Scope . 15
2 Normative references . 15
3 Terms, definitions, and abbreviated terms . 16
3.1 Terms and definitions . 16
3.2 Abbreviated terms . 17
4 Overview . 17
4.1 General . 17
4.2 ConformanceUnit . 18
4.3 Profiles . 18
4.4 Profile Categories . 19
5 Conformance Units . 19
5.1 Overview. 19
5.2 Services . 20
5.3 Transport and communication related features . 30
5.4 Information Model and AddressSpace related features . 38
5.5 Miscellaneous . 55
6 Profiles . 57
6.1 Overview. 57
6.2 Profile list . 57
6.3 Conventions for Profile definitions . 64
6.4 Profile versioning . 64
6.5 Applications . 64
6.6 Profile tables . 66
6.6.1 General . 66
6.6.2 Core Server Facet . 66
6.6.3 Core 2017 Server Facet . 66
6.6.4 Sessionless Server Facet . 67
6.6.5 Reverse Connect Server Facet . 67
6.6.6 Base Server Behaviour Facet . 68
6.6.7 Request State Change Server Facet . 68
6.6.8 Subnet Discovery Server Facet . 68
6.6.9 Global Certificate Management Server Facet . 68
6.6.10 Authorization Service Server Facet . 69
6.6.11 KeyCredential Service Server Facet . 69
6.6.12 Attribute WriteMask Server Facet . 69
6.6.13 File Access Server Facet . 69
6.6.14 Documentation Server Facet . 70
6.6.15 Embedded DataChange Subscription Server Facet . 70
6.6.16 Standard DataChange Subscription Server Facet . 70
6.6.17 Standard DataChange Subscription 2017 Server Facet . 71
6.6.18 Enhanced DataChange Subscription Server Facet . 71
6.6.19 Enhanced DataChange Subscription 2017 Server Facet . 71
6.6.20 Durable Subscription Server Facet . 71
6.6.21 Data Access Server Facet . 72
6.6.22 ComplexType Server Facet . 72
6.6.23 ComplexType 2017 Server Facet . 72
6.6.24 Standard Event Subscription Server Facet . 73
6.6.25 Address Space Notifier Server Facet . 74
6.6.26 A & C Base Condition Server Facet . 74
6.6.27 A & C Refresh2 Server Facet . 74
6.6.28 A & C Address Space Instance Server Facet . 74
6.6.29 A & C Enable Server Facet . 75
6.6.30 A & C AlarmMetrics Server Facet . 75
6.6.31 A & C Alarm Server Facet . 75
6.6.32 A & C Acknowledgeable Alarm Server Facet . 76
6.6.33 A & C Exclusive Alarming Server Facet . 76
6.6.34 A & C Non-Exclusive Alarming Server Facet . 77
6.6.35 A & C Previous Instances Server Facet . 77
6.6.36 A & C Dialog Server Facet . 77
6.6.37 A & C CertificateExpiration Server Facet . 78
6.6.38 A & E Wrapper Facet . 78
6.6.39 Method Server Facet . 79
6.6.40 Auditing Server Facet . 79
6.6.41 Node Management Server Facet. 80
6.6.42 User Role Base Server Facet . 80
6.6.43 User Role Management Server Facet . 80
6.6.44 State Machine Server Facet . 81
6.6.45 Client Redundancy Server Facet . 81
6.6.46 Redundancy Transparent Server Facet . 81
6.6.47 Redundancy Visible Server Facet . 82
6.6.48 Historical Raw Data Server Facet . 82
6.6.49 Historical Aggregate Server Facet . 82
6.6.50 Historical Data AtTime Server Facet . 83
6.6.51 Historical Access Modified Data Server Facet . 84
6.6.52 Historical Annotation Server Facet . 84
6.6.53 Historical Data Insert Server Facet . 84
6.6.54 Historical Data Update Server Facet . 84
6.6.55 Historical Data Replace Server Facet . 85
6.6.56 Historical Data Delete Server Facet . 85
6.6.57 Historical Access Structured Data Server Facet . 85
6.6.58 Base Historical Event Server Facet . 85
6.6.59 Historical Event Update Server Facet . 86
6.6.60 Historical Event Replace Server Facet . 86
6.6.61 Historical Event Insert Server Facet . 86
6.6.62 Historical Event Delete Server Facet . 86
6.6.63 Aggregate Subscription Server Facet . 87
6.6.64 Nano Embedded Device Server Profile . 88
6.6.65 Nano Embedded Device 2017 Server Profile . 88
6.6.66 Micro Embedded Device Server Profile . 88
6.6.67 Micro Embedded Device 2017 Server Profile . 88
6.6.68 Embedded UA Server Profile . 88
6.6.69 Embedded 2017 UA Server Profile . 89
6.6.70 Standard UA Server Profile . 89
6.6.71 Standard 2017 UA Server Profile . 89
– 4 – IEC 62541-7:2020 © IEC 2020
6.6.72 Core Client Facet. 90
6.6.73 Core 2017 Client Facet . 90
6.6.74 Sessionless Client Facet . 90
6.6.75 Reverse Connect Client Facet . 90
6.6.76 Base Client Behaviour Facet . 91
6.6.77 Discovery Client Facet . 91
6.6.78 Subnet Discovery Client Facet . 91
6.6.79 Global Discovery Client Facet . 92
6.6.80 Global Certificate Management Client Facet . 92
6.6.81 KeyCredential Service Client Facet . 92
6.6.82 Access Token Request Client Facet . 92
6.6.83 AddressSpace Lookup Client Facet . 93
6.6.84 Request State Change Client Facet . 93
6.6.85 File Access Client Facet . 93
6.6.86 Entry Level Support 2015 Client Facet . 94
6.6.87 Multi-Server Client Connection Facet . 94
6.6.88 Documentation – Client . 94
6.6.89 Attribute Read Client Facet . 94
6.6.90 Attribute Write Client Facet . 95
6.6.91 DataChange Subscriber Client Facet . 95
6.6.92 Durable Subscription Client Facet . 96
6.6.93 DataAccess Client Facet . 96
6.6.94 Event Subscriber Client Facet. 97
6.6.95 Base Event Processing Client Facet . 97
6.6.96 Notifier and Source Hierarchy Client Facet . 98
6.6.97 A & C Base Condition Client Facet . 98
6.6.98 A & C Refresh2 Client Facet . 98
6.6.99 A & C Address Space Instance Client Facet . 99
6.6.100 A & C Enable Client Facet . 99
6.6.101 A & C AlarmMetrics Client Facet . 99
6.6.102 A & C Alarm Client Facet . 99
6.6.103 A & C Exclusive Alarming Client Facet . 100
6.6.104 A & C Non-Exclusive Alarming Client Facet . 100
6.6.105 A & C Previous Instances Client Facet . 101
6.6.106 A & C Dialog Client Facet . 101
6.6.107 A & C CertificateExpiration Client Facet . 101
6.6.108 A & E Proxy Facet . 102
6.6.109 Method Client Facet. 103
6.6.110 Auditing Client Facet . 103
6.6.111 Node Management Client Facet . 103
6.6.112 Advanced Type Programming Client Facet . 103
6.6.113 User Role Management Client Facet . 104
6.6.114 State Machine Client Facet . 104
6.6.115 Diagnostic Client Facet . 104
6.6.116 Redundant Client Facet . 105
6.6.117 Redundancy Switch Client Facet . 105
6.6.118 Historical Access Client Facet . 105
6.6.119 Historical Data AtTime Client Facet . 105
6.6.120 Historical Aggregate Client Facet . 105
6.6.121 Historical Annotation Client Facet . 107
6.6.122 Historical Access Modified Data Client Facet . 107
6.6.123 Historical Data Insert Client Facet . 107
6.6.124 Historical Data Update Client Facet . 107
6.6.125 Historical Data Replace Client Facet. 107
6.6.126 Historical Data Delete Client Facet . 108
6.6.127 Historical Access Client Server Timestamp Facet . 108
6.6.128 Historical Structured Data Access Client Facet . 108
6.6.129 Historical Structured Data AtTime Client Facet . 108
6.6.130 Historical Structured Data Modified Client Facet . 109
6.6.131 Historical Structured Data Insert Client Facet . 109
6.6.132 Historical Structured Data Update Client Facet . 109
6.6.133 Historical Structured Data Replace Client Facet . 109
6.6.134 Historical Structured Data Delete Client Facet . 109
6.6.135 Historical Events Client Facet . 110
6.6.136 Historical Event Insert Client Facet . 110
6.6.137 Historical Event Update Client Facet. 110
6.6.138 Historical Event Replace Client Facet . 110
6.6.139 Historical Event Delete Client Facet . 111
6.6.140 Aggregate Subscriber Client Facet . 111
6.6.141 Standard UA Client Profile . 112
6.6.142 Standard UA Client 2017 Profile . 112
6.6.143 UA-TCP UA-SC UA-Binary. 113
6.6.144 HTTPS UA-Binary . 113
6.6.145 HTTPS UA-XML . 114
6.6.146 HTTPS UA-JSON. 114
6.6.147 WSS UA-SC UA-Binary. 114
6.6.148 WSS UA-JSON . 114
6.6.149 Security User Access Control Full . 115
6.6.150 Security User Access Control Base. 115
6.6.151 Security Time Synchronization . 115
6.6.152 Best Practice – Audit Events . 116
6.6.153 Best Practice – Alarm Handling . 116
6.6.154 Best Practice – Random Numbers . 116
6.6.155 Best Practice – Timeouts . 116
6.6.156 Best Practice – Administrative Access . 116
6.6.157 Best Practice – Strict Message Handling . 117
6.6.158 Best Practice – Audit Events Client . 117
6.6.159 TransportSecurity – TLS 1.2 . 117
6.6.160 TransportSecurity – TLS 1.2 with PFS . 117
6.6.161 SecurityPolicy – None . 118
6.6.162 SecurityPolicy – Basic128Rsa15 . 118
6.6.163 SecurityPolicy – Basic256 . 118
6.6.164 SecurityPolicy [A] – Aes128-Sha256-RsaOaep . 118
6.6.165 SecurityPolicy [B] – Basic256Sha256 . 119
6.6.166 SecurityPolicy – Aes256-Sha256-RsaPss . 119
6.6.167 User Token – Anonymous Facet . 120
6.6.168 User Token – User Name Password Server Facet . 120
6.6.169 User Token – X509 Certificate Server Facet . 120
– 6 – IEC 62541-7:2020 © IEC 2020
6.6.170 User Token – Issued Token Server Facet . 121
6.6.171 User Token – Issued Token Windows Server Facet . 121
6.6.172 User Token – JWT Server Facet . 121
6.6.173 User Token – User Name Password Client Facet . 121
6.6.174 User Token – X509 Certificate Client Facet . 122
6.6.175 User Token – Issued Token Client Facet . 122
6.6.176 User Token – Issued Token Windows Client Facet . 122
6.6.177 User Token – JWT Client Facet . 122
6.6.178 Global Discovery Server Profile . 122
6.6.179 Global Discovery Server 2017 Profile . 123
6.6.180 Global Discovery and Certificate Management Server. 123
6.6.181 Global Discovery and Certificate Mgmt 2017 Server . 123
6.6.182 Global Certificate Management Client Profile . 123
6.6.183 Global Certificate Management Client 2017 Profile . 123
6.6.184 Global Service Authorization Request Server Facet . 124
6.6.185 Global Service KeyCredential Pull Facet . 124
6.6.186 Global Service KeyCredential Push Facet . 124
Bibliography . 125
Figure 1 – Profile – ConformanceUnit – TestCases . 18
Figure 2 – HMI Client sample . 64
Figure 3 – Embedded Server sample . 65
Figure 4 – Standard UA Server sample . 65
Table 1 – Profile Categories . 19
Table 2 – Conformance Groups . 20
Table 3 – Discovery Services . 21
Table 4 – Session Services . 22
Table 5 – Node Management Services . 23
Table 6 – View Services . 24
Table 7 – Attribute Services . 25
Table 8 – Method Services . 26
Table 9 – Monitored Item Services . 27
Table 10 – Subscription Services . 29
Table 11 – Security . 31
Table 12 – Protocol and Encoding . 38
Table 13 – Base Information . 39
Table 14 – Address Space Model . 41
Table 15 – Data Access . 42
Table 16 – Alarms and Conditions . 43
Table 17 – Historical Access . 46
Table 18 – Aggregates . 49
Table 19 – Auditing . 54
Table 20 – Redundancy . 54
Table 21 – Global Discovery Server . 55
Table 22 – Miscellaneous . 56
Table 23 – Profile list . 58
Table 24 – Core 2017 Server Facet . 67
Table 25 – Sessionless Server Facet . 67
Table 26 – Reverse Connect Server Facet . 68
Table 27 – Base Server Behaviour Facet . 68
Table 28 – Request State Change Server Facet . 68
Table 29 – Subnet Discovery Server Facet . 68
Table 30 – Global Certificate Management Server Facet . 69
Table 31 – Authorization Service Server Facet . 69
Table 32 – KeyCredential Service Server Facet . 69
Table 33 – Attribute WriteMask Server Facet . 69
Table 34 – File Access Server Facet . 70
Table 35 – Documentation Server Facet . 70
Table 36 – Embedded DataChange Subscription Server Facet . 70
Table 37 – Standard DataChange Subscription 2017 Server Facet . 71
Table 38 – Enhanced DataChange Subscription 2017 Server Facet . 71
Table 39 – Durable Subscription Server Facet . 72
Table 40 – Data Access Server Facet . 72
Table 41 – ComplexType 2017 Server Facet . 73
Table 42 – Standard Event Subscription Server Facet . 73
Table 43 – Address Space Notifier Server Facet . 74
Table 44 – A & C Base Condition Server Facet . 74
Table 45 – A & C Refresh2 Server Facet . 74
Table 46 – A & C Address Space Instance Server Facet . 75
Table 47 – A & C Enable Server Facet . 75
Table 48 – A & C AlarmMetrics Server Facet . 75
Table 49 – A & C Alarm Server Facet . 76
Table 50 – A & C Acknowledgeable Alarm Server Facet . 76
Table 51 – A & C Exclusive Alarming Server Facet . 77
Table 52 – A & C Non-Exclusive Alarming Server Facet . 77
Table 53 – A & C Previous Instances Server Facet . 77
Table 54 – A & C Dialog Server Facet . 78
Table 55 – A & C CertificateExpiration Server Facet . 78
Table 56 – A & E Wrapper Facet . 79
Table 57 – Method Server Facet . 79
Table 58 – Auditing Server Facet . 80
Table 59 – Node Management Server Facet . 80
Table 60 – User Role Base Server Facet . 80
Table 61 – User Role Management Server Facet . 81
Table 62 – State Machine Server Facet . 81
Table 63 – Client Redundancy Server Facet . 81
Table 64 – Redundancy Transparent Server Facet. 81
– 8 – IEC 62541-7:2020 © IEC 2020
Table 65 – Redundancy Visible Server Facet . 82
Table 66 – Historical Raw Data Server Facet . 82
Table 67 – Historical Aggregate Server Facet . 83
Table 68 – Historical Data AtTime Server Facet . 84
Table 69 – Historical Access Modified Data Server Facet . 84
Table 70 – Historical Annotation Server Facet . 84
Table 71 – Historical Data Insert Server Facet . 84
Table 72 – Historical Data Update Server Facet . 85
Table 73 – Historical Data Replace Server Facet . 85
Table 74 – Historical Data Delete Server Facet . 85
Table 75 – Historical Access Structured Data Server Facet. 85
Table 76 – Base Historical Event Server Facet . 86
Table 77 – Historical Event Update Server Facet . 86
Table 78 – Historical Event Replace Server Facet . 86
Table 79 – Historical Event Insert Server Facet . 86
Table 80 – Historical Event Delete Server Facet . 86
Table 81 – Aggregate Subscription Server Facet . 87
Table 82 – Nano Embedded Device 2017 Server Profile . 88
Table 83 – Micro Embedded Device 2017 Server Profile . 88
Table 84 – Embedded 2017 UA Server Profile . 89
Table 85 – Standard 2017 UA Server Profile . 89
Table 86 – Core 2017 Client Facet . 90
Table 87 – Sessionless Client Facet . 90
Table 88 – Reverse Connect Client Facet . 91
Table 89 – Base Client Behaviour Facet . 91
Table 90 – Discovery Client Facet. 91
Table 91 – Subnet Discovery Client Facet . 92
Table 92 – Global Discovery Client Facet . 92
Table 93 – Global Certificate Management Client Facet . 92
Table 94 – KeyCredential Service Client Facet . 92
Table 95 – Access Token Request Client Facet . 93
Table 96 – AddressSpace Lookup Client Facet . 93
Table 97 – Request State Change Client Facet . 93
Table 98 – File Access Client Facet . 93
Table 99 – Entry Level Support 2015 Client Facet . 94
Table 100 – Multi-Server Client Connection Facet . 94
Table 101 – Documentation – Client . 94
Table 102 – Attribute Read Client Facet. 95
Table 103 – Attribute Write Client Facet . 95
Table 104 – DataChange Subscriber Client Facet . 96
Table 105 – Durable Subscription Client Facet. 96
Table 106 – DataAccess Client Facet . 97
Table 107 – Event Subscriber Client Facet . 97
Table 108 – Base Event Processing Client Facet . 98
Table 109 – Notifier and Source Hierarchy Client Facet . 98
Table 110 – A & C Base Condition Client Facet . 98
Table 111 – A & C Refresh2 Client Facet . 99
Table 112 – A & C Address Space Instance Client Facet . 99
Table 113 – A & C Enable Client Facet . 99
Table 114 – A & C AlarmMetrics Client Facet . 99
Table 115 – A & C Alarm Client Facet . 100
Table 116 – A & C Exclusive Alarming Client Facet . 100
Table 117 – A & C Non-Exclusive Alarming Client Facet .
...
Frequently Asked Questions
IEC 62541-7:2020 is a standard published by the International Electrotechnical Commission (IEC). Its full title is "OPC Unified Architecture - Part 7: Profiles". This standard covers: IEC 62541-7:2020 defines the OPC Unified Architecture (OPC UA) Profiles. The Profiles in this document are used to segregate features with regard to testing of OPC UA products and the nature of the testing (tool based or lab based). This includes the testing performed by the OPC Foundation provided OPC UA CTT (a self-test tool) and by the OPC Foundation provided Independent certification test labs. This could equally as well refer to test tools provided by another organization or a test lab provided by another organization. What is important is the concept of automated tool-based testing versus lab-based testing. The scope of this standard includes defining functionality that can only be tested in a lab and defining the grouping of functionality that is to be used when testing OPC UA products either in a lab or using automated tools. The definition of actual TestCases is not within the scope of this document, but the general categories of TestCases are within the scope of this document. Most OPC UA applications will conform to several, but not all, of the Profiles. This third edition cancels and replaces the second edition published in 2015. This edition constitutes a technical revision. This edition includes the following significant technical changes with respect to the previous edition: a) new functional Profiles: • profiles for global discovery and global certificate management; • profiles for global KeyCredential management and global access token management; • facet for durable subscriptions; • standard UA Client Profile; • profiles for administration of user roles and permissions. b) new transport Profiles: • HTTPS with JSON encoding; • secure WebSockets (WSS) with binary or JSON encoding; • reverse connectivity. c) new security Profiles: • transportSecurity – TLS 1.2 with PFS (with perfect forward secrecy); • securityPolicy [A] – Aes128-Sha256-RsaOaep (replaces Base128Rsa15); • securityPolicy – Aes256-Sha256-RsaPss adds perfect forward secrecy for UA TCP); • user Token JWT (Jason Web Token). d) deprecated Security Profiles (due to broken algorithms): • securityPolicy – Basic128Rsa15 (broken algorithm Sha1); • securityPolicy – Basic256 (broken algorithm Sha1); • transportSecurity – TLS 1.0 (broken algorithm RC4); • transportSecurity – TLS 1.1 (broken algorithm RC4). e) deprecated Transport (missing support on most platforms): • SOAP/HTTP with WS-SecureConversation (all encodings).
IEC 62541-7:2020 defines the OPC Unified Architecture (OPC UA) Profiles. The Profiles in this document are used to segregate features with regard to testing of OPC UA products and the nature of the testing (tool based or lab based). This includes the testing performed by the OPC Foundation provided OPC UA CTT (a self-test tool) and by the OPC Foundation provided Independent certification test labs. This could equally as well refer to test tools provided by another organization or a test lab provided by another organization. What is important is the concept of automated tool-based testing versus lab-based testing. The scope of this standard includes defining functionality that can only be tested in a lab and defining the grouping of functionality that is to be used when testing OPC UA products either in a lab or using automated tools. The definition of actual TestCases is not within the scope of this document, but the general categories of TestCases are within the scope of this document. Most OPC UA applications will conform to several, but not all, of the Profiles. This third edition cancels and replaces the second edition published in 2015. This edition constitutes a technical revision. This edition includes the following significant technical changes with respect to the previous edition: a) new functional Profiles: • profiles for global discovery and global certificate management; • profiles for global KeyCredential management and global access token management; • facet for durable subscriptions; • standard UA Client Profile; • profiles for administration of user roles and permissions. b) new transport Profiles: • HTTPS with JSON encoding; • secure WebSockets (WSS) with binary or JSON encoding; • reverse connectivity. c) new security Profiles: • transportSecurity – TLS 1.2 with PFS (with perfect forward secrecy); • securityPolicy [A] – Aes128-Sha256-RsaOaep (replaces Base128Rsa15); • securityPolicy – Aes256-Sha256-RsaPss adds perfect forward secrecy for UA TCP); • user Token JWT (Jason Web Token). d) deprecated Security Profiles (due to broken algorithms): • securityPolicy – Basic128Rsa15 (broken algorithm Sha1); • securityPolicy – Basic256 (broken algorithm Sha1); • transportSecurity – TLS 1.0 (broken algorithm RC4); • transportSecurity – TLS 1.1 (broken algorithm RC4). e) deprecated Transport (missing support on most platforms): • SOAP/HTTP with WS-SecureConversation (all encodings).
IEC 62541-7:2020 is classified under the following ICS (International Classification for Standards) categories: 25.040.40 - Industrial process measurement and control; 35.100.05 - Multilayer applications. The ICS classification helps identify the subject area and facilitates finding related standards.
IEC 62541-7:2020 has the following relationships with other standards: It is inter standard links to IEC 62541-7:2015, IEC 62541-7:2025. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
You can purchase IEC 62541-7:2020 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of IEC standards.
IEC 62541-7:2020 is a standard that defines the OPC Unified Architecture (OPC UA) Profiles. These Profiles are used to categorize and test OPC UA products, either through automated tool-based testing or lab-based testing. The standard includes new functional, transport, and security Profiles, as well as deprecating some outdated Profiles. The goal is to ensure compatibility and security in OPC UA applications. This third edition replaces the previous edition published in 2015 and includes several technical changes.
IEC 62541-7:2020은 OPC 통합 아키텍처 (OPC UA) 프로필을 정의하는 표준입니다. 이 문서의 프로필은 OPC UA 제품의 테스트와 테스트의 성격 (도구 기반 또는 실험실 기반)을 구분하기 위해 사용됩니다. 이에는 OPC Foundation에서 제공하는 OPC UA CTT (자체 테스트 도구)와 OPC Foundation에서 제공하는 독립 인증 테스트 실험실의 테스트가 포함됩니다. 또는 다른 조직에서 제공하는 테스트 도구 또는 테스트 실험실일 수도 있습니다. 중요한 것은 자동화된 도구 기반 테스트와 실험실 기반 테스트의 개념입니다. 이 표준의 범위에는 실험실에서만 테스트할 수 있는 기능을 정의하고 실험실이나 자동화된 도구를 사용하여 OPC UA 제품을 테스트할 때 사용할 기능을 그룹화하는 것도 포함됩니다. 실제 테스트 케이스의 정의는 이 문서의 범위가 아니지만, 테스트 케이스의 일반적인 범주는 이 문서의 범위에 포함됩니다. 대부분의 OPC UA 응용 프로그램은 다양한 프로필을 준수할 것입니다. 이번 판은 2015년에 게시된 두 번째 판을 취소하고 대체하는 것입니다. 이번 판은 기술적 개정입니다. 이번 판에는 다음과 같은 중요한 기술적 변경 사항이 포함되어 있습니다. a) 새로운 기능 프로필: - 전역 검색 및 전역 인증서 관리를 위한 프로필; - 전역 KeyCredential 관리 및 전역 액세스 토큰 관리를 위한 프로필; - 유지 가능한 구독을 위한 패싯; - 표준 UA 클라이언트 프로필; - 사용자 역할 및 권한 관리를 위한 프로필. b) 새로운 전송 프로필: - JSON 인코딩을 사용하는 HTTPS; - 바이너리 또는 JSON 인코딩을 사용하는 안전한 웹 소켓 (WSS); - 역방향 연결. c) 새로운 보안 프로필: - transportSecurity - PFS가 있는 TLS 1.2 (완전한 전달 보안); - securityPolicy [A] - Aes128-Sha256-RsaOaep (Base128Rsa15 대체); - securityPolicy - Aes256-Sha256-RsaPss (UA TCP에 대한 완전한 전달 보안 추가); - 사용자 토큰 JWT (Jason Web Token). d) 사용되지 않는 보안 프로필 (손상된 알고리즘 때문): - securityPolicy - Basic128Rsa15 (손상된 알고리즘 Sha1); - securityPolicy - Basic256 (손상된 알고리즘 Sha1); - transportSecurity - TLS 1.0 (손상된 알고리즘 RC4); - transportSecurity - TLS 1.1 (손상된 알고리즘 RC4). e) 사용되지 않는 전송 프로필 (대부분의 플랫폼에서 지원하지 않음): - WS-SecureConversation을 사용하는 SOAP/HTTP (모든 인코딩).
IEC 62541-7:2020は、OPC Unified Architecture (OPC UA) プロファイルを定義する国際規格です。このドキュメントでは、OPC UA製品のテストとテストの性質(ツールベースまたはラボベース)を区別するために、プロファイルが使用されます。これには、OPC Foundationが提供するOPC UA CTT(自己テストツール)によるテストや、OPC Foundationが提供する独立した認証テストラボによるテストが含まれます。別の組織が提供するテストツールやテストラボであっても同様です。重要なのは、自動化ツールベースのテストとラボベースのテストの概念です。この規格の範囲には、ラボでのみテストできる機能の定義と、ラボまたは自動化ツールを使用してOPC UA製品をテストする際に使用する機能のグループ化も含まれます。実際のテストケースの定義はこのドキュメントの範囲外ですが、一般的なテストケースのカテゴリはこのドキュメントの範囲内にあります。 ほとんどのOPC UAアプリケーションは、複数のプロファイルに準拠します。 この第3版は、2015年に発行された第2版を取り消して置き換えるものです。この版には、以下の重要な技術的な変更が含まれています: a) 新しい機能プロファイル: - グローバルディスカバリとグローバル証明書管理のためのプロファイル; - グローバルKeyCredential管理とグローバルアクセストークン管理のためのプロファイル; - 永続的なサブスクリプションのためのfacets; - 標準UAクライアントプロファイル; - ユーザーの役割と権限の管理のためのプロファイル。 b) 新しい輸送プロファイル: - JSONエンコーディングを使用するHTTPS; - バイナリまたはJSONエンコーディングを使用するセキュアWebSockets(WSS); - 逆接続。 c) 新しいセキュリティプロファイル: - トランスポートセキュリティ - トランスポートレイヤーセキュリティ(PFS)を備えたTLS 1.2; - SecurityPolicy[A] - Aes128-Sha256-RsaOaep(Base128Rsa15の置き換え); - SecurityPolicy - Aes256-Sha256-RsaPss(UA TCPの完全なPFSを追加); - ユーザートークンJWT(Jason Web Token)。 d) 廃止されたセキュリティプロファイル(壊れたアルゴリズムのため): - SecurityPolicy - Basic128Rsa15(壊れたアルゴリズムSha1); - SecurityPolicy - Basic256(壊れたアルゴリズムSha1); - トランスポートセキュリティ - TLS 1.0(壊れたアルゴリズムRC4); - トランスポートセキュリティ - TLS 1.1(壊れたアルゴリズムRC4)。 e) 廃止された輸送プロファイル(ほとんどのプラットフォームでサポートされていない): - WS-SecureConversationを使用するSOAP/HTTP(すべてのエンコーディング)。










Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...