Parameter Reference
Several parameters appear across numerous endpoints of the IDIAL REST API. This page documents their valid values and their meaning.
security_policy
OPC UA Security Policy bitmask. Controls which security policies IDIAL accepts when establishing a connection to an OPC UA server. Values can be combined (OR bitmask).
| Value | Security Policy | Note |
|---|---|---|
1 | Basic128Rsa15 | Deprecated, not recommended for production use |
2 | Basic256 | |
4 | Aes128Sha256RsaOaep | |
8 | Basic256Sha256 | Recommended |
16 | Aes256Sha256RsaPss | Strongest encryption |
Default: 31 (all policies accepted — combination of 1+2+4+8+16)
Example: The value 9 enables Basic128Rsa15 + Basic256Sha256.
Basic128Rsa15 (value 1) is deprecated and disabled in modern OPC UA stacks. For production environments, only Basic256Sha256 (8) or Aes256Sha256RsaPss (16) should be used.
security_mode
OPC UA Security Mode. Controls the signing and encryption of messages in OPC UA connections.
| Value | Mode | Description |
|---|---|---|
0 | None | No signing and no encryption. Insecure. |
1 | Sign | Messages are signed but not encrypted. |
2 | SignAndEncrypt | Messages are signed and encrypted. Recommended for production use. |
Default: 0 (None — no authentication)
Operating with security_mode: 0 means that OPC UA communication is neither signed nor encrypted. This mode must only be used in isolated test environments.
trustlist
Bitmask controlling which components of the trust list are read or written. Values can be combined.
| Value | Component | Description |
|---|---|---|
0 | None | No trust list component |
1 | TrustedCertificates | Trusted endpoint certificates |
2 | TrustedCrls | CRLs for trusted certificates |
4 | IssuerCertificates | CA / issuer certificates |
8 | IssuerCrls | CRLs for CA certificates |
15 | All | All components (1+2+4+8) |
Default: 15 (All)
device_status
Controls whether IDIAL actively manages certificates for an inventory entry.
| Value | Status | Behavior |
|---|---|---|
0 | Inactive | IDIAL monitors the endpoint but does not trigger any certificate or trust list updates. |
1 | Active | IDIAL actively manages the certificate lifecycle. |