Skip to content
  • There are no suggestions because the search field is empty.

Remote Access Configuration

Overview

Remote access plays an important role in both pre-commissioning activities and ongoing system support. When permitted, establishing remote access ahead of time allows the visability team and support personnel to assist with setup, troubleshooting, and future maintenance without requiring onsite presence.

This is especially valuable in deployments that span multiple locations or time zones.

Why Remote Access Matters

While visability systems can be fully deployed onsite, remote access enables:

  • Pre-commissioning validation and setup
  • Faster troubleshooting during deployment
  • Ongoing support without scheduling onsite visits
  • Flexibility when working across different time zones

Without remote access, even minor issues can result in delays due to coordination and physical access requirements.

Defining The Access Method

If remote access is allowed, the method should be clearly defined in advance.

This may include:

  • Approved remote access tools (e.g., corporate-standard tools)
  • VPN or secure network access requirements
  • Any restrictions on how systems can be accessed

The goal is to align with the organization’s security policies while ensuring that access is practical and reliable.

System Preparation

Remote access tools should be installed and configured on the systems that require support access.

In most deployments, this includes:

  • System Manager (ASM)
  • Display Nodes (DN)

These systems should be reachable and accessible using the approved method prior to commissioning.

Unattended Access Considerations

Where permitted, unattended access is strongly recommended.

This allows authorized personnel to connect to systems without requiring someone onsite to initiate the session. It is particularly useful for:

  • Supporting systems outside of standard working hours
  • Coordinating across time zones
  • Performing updates, troubleshooting, or validation remotely

If unattended access is not allowed, clear procedures should be established for how access will be granted when needed.

Security and Coordination

Remote access should always be configured in alignment with the organization’s security policies.

Before commissioning, confirm:

  • Access methods are approved by IT or security teams
  • Credentials or access permissions are defined
  • Points of contact are established for access coordination

This helps ensure that remote access is both effective and compliant.

Alternative Access Methods

If dedicated remote access is not available or permitted, commissioning and support activities can still be performed remotely using screen sharing tools such as Microsoft Teams or similar platforms.

In these cases:

  • An onsite user will be required to initiate and maintain the session
  • System access will be guided in real time by the visability team
  • Troubleshooting and validation can still be completed, though with some added coordination

While this approach is effective, it may require additional scheduling and onsite availability compared to fully configured remote access.