FORUM CTRLX AUTOMATION
ctrlX World Partner Apps for ctrlX AUTOMATION
Dear Community User! We have started the migration process.
This community is now in READ ONLY mode.
Read more: Important
information on the platform change.
10-07-2021 04:54 PM
Is remote access of the device portal to a ctrlX Core via key switch possible? Preferably with as little additional hardware as possible. Just as is usually done with Nexeed RSA. See here at 6.1 "Initiate Remote Access": https://www.bosch-connected-industry.com/de/media/en/loesungen/nexeed_remote_shopfloor_access/suppli...
Solved! Go to Solution.
10-07-2021 07:10 PM
Hi jacare,
yes, it is. You can set the policy on the device to "ask user" before the remote access is enabled. This will trigger a request on the device before the access is granted. One can acknoledge this request on the webinterface of the ctrlX CORE, on a web-based HMI what integrates it via the data layer or with other logic e.g. as you describe it. It is up to you what setup you want. The connection can be cut on the device side any time. Individual user permissions can be set.
If you want to have a physical key switch of course you need to add and connect it to your setup.
Cheers
J
10-12-2021 12:27 PM
thanks for the answer. Still, could you guide me in the right direction when I have a TRUE or a "1" in the data layer for example with an IO module. Where and how should I implement the logic to now allow the VPN access when a TRUE is on a data layer node?
10-14-2021 03:42 PM - edited 10-19-2021 07:52 AM
There is no predefined function to do so but you can use the REST API e.g. with Node-RED or the PLC.
There are at least two possibilities:
PUT https://192.168.0.169/remote-agent/api/v1/remoteaccess
Open:
{"enabled":true}
Close:{"enabled":false}
GET https://192.168.0.169/remote-agent/api/v1/commands
Response:[
{
"id": "xxxxxxxxxxxxxxxxxxxxxxxxx",
"deviceId": "urn:bosch:deviceportal:id:ctrlXCORE.seq.xxxxxxxxxxxxDG",
"commandType": "UPDATE_TUNNEL",
"state": "TRANSMITTED",
"softwareId": "",
"source": "",
"target": "",
"timestamp": 1634217813,
"Raw": {
"cmd": "UPDATE_TUNNEL",
"id": "xxxxxxxxxxxxxxxxxxxxxxxxx",
"tunnelStateActive": "true"
}
}
]
PUT https://192.168.0.169/remote-agent/api/v1/commands/xxxxxxxxxxxxxxxxxxxxxxxxx
Request:{
"id": "xxxxxxxxxxxxxxxxxxxxxxxxx",
"deviceId": "urn:bosch:deviceportal:id:ctrlXCORE.seq.xxxxxxxxxxxxDG",
"commandType": "UPDATE_TUNNEL",
"state": "ACCEPTED",
"softwareId": "",
"source": "",
"target": "",
"timestamp": 1634217813,
"Raw": {
"cmd": "UPDATE_TUNNEL",
"id": "xxxxxxxxxxxxxxxxxxxxxxxxx",
"tunnelStateActive": "true"
}
}