Remote Access Configuration
Overview
Remote access plays an important role in both pre-commissioning activities and ongoing system support. When permitted, establishing remote access ahead of time allows the visability team and support personnel to assist with setup, troubleshooting, and future maintenance without requiring onsite presence.
This is especially valuable in deployments that span multiple locations or time zones.
Why Remote Access Matters
While visability systems can be fully deployed onsite, remote access enables:
- Pre-commissioning validation and setup
- Faster troubleshooting during deployment
- Ongoing support without scheduling onsite visits
- Flexibility when working across different time zones
Without remote access, even minor issues can result in delays due to coordination and physical access requirements.
Defining The Access Method
If remote access is allowed, the method should be clearly defined in advance.
This may include:
- Approved remote access tools (e.g., corporate-standard tools)
- VPN or secure network access requirements
- Any restrictions on how systems can be accessed
The goal is to align with the organization’s security policies while ensuring that access is practical and reliable.
System Preparation
Remote access tools should be installed and configured on the systems that require support access.
In most deployments, this includes:
- System Manager (ASM)
- Display Nodes (DN)
These systems should be reachable and accessible using the approved method prior to commissioning.
Unattended Access Considerations
Where permitted, unattended access is strongly recommended.
This allows authorized personnel to connect to systems without requiring someone onsite to initiate the session. It is particularly useful for:
- Supporting systems outside of standard working hours
- Coordinating across time zones
- Performing updates, troubleshooting, or validation remotely
If unattended access is not allowed, clear procedures should be established for how access will be granted when needed.
Security and Coordination
Remote access should always be configured in alignment with the organization’s security policies.
Before commissioning, confirm:
- Access methods are approved by IT or security teams
- Credentials or access permissions are defined
- Points of contact are established for access coordination
This helps ensure that remote access is both effective and compliant.
Alternative Access Methods
If dedicated remote access is not available or permitted, commissioning and support activities can still be performed remotely using screen sharing tools such as Microsoft Teams or similar platforms.
In these cases:
- An onsite user will be required to initiate and maintain the session
- System access will be guided in real time by the visability team
- Troubleshooting and validation can still be completed, though with some added coordination
While this approach is effective, it may require additional scheduling and onsite availability compared to fully configured remote access.