Skip to Main Content
AVEVA™ Products Feedback Portal

Welcome to our new feedback site!


We created this site to hear your enhancement ideas, suggestions and feedback about AVEVA products and services. All of the feedback you share here is monitored and reviewed by the AVEVA product managers.

To start, select the product of your interest in the left column. Then take a look at the ideas in the list below and VOTE for your favorite ideas submitted by other users. POST your own idea if it hasn’t been suggested yet. Include COMMENTS and share relevant business case details that will help our product team get more information on the suggestion. Please note that your ideas will first be moderated before they are made visible to other users of this portal.

This page is for feedback for specific AVEVA solutions, excluding PI Systems and Data Hub. For links to these other feedback portals, please see the tab RESOURCES below.

Status Reviewing
Portfolio area Enterprise SCADA Server
Created by Collin Heggerud
Created on Feb 29, 2024

Add ability for Omnicomm to support secure connections to devices

Enterprise SCADA desires to be at the forefront of security. Many protocols are beginning to support SSL/TLS connections to the end device, thus finally protecting that last few feet of communications from the networking equipment to the device. For instance, TGP Peru requested secure Modbus (see EXT-424) and more recently ATMOS is inquiring about DNP3 SAv6. Because Omnicomm manages the connection to the device this must be implemented in the core product and not in the protocol itself.

Expectation

We expect that a protocol developer could support the necessary encryption demanded by a protocol. In SSL/TLS cases, this may be generic and may not require any protocol specific knowledge, but we should also consider that the encryption may have protocol specific components, or even libraries (e.g., think of the Totalflow library approach).

Idea business value

ES should be the most secure option available, it is part of our strategic differentiator that justifies our (relatively high) cost. Because there is a long lead time, we should have this ability available for when customers start to demand it (which could be any time).

Idea Type Improvement
Idea Category Future State
Idea priority 5 – Critical to my company
Product value score
18
User Persona Developer / Integrator, IT/Network Administrator, SCADA Administrator
Work in
OASYS-E-402 Add ability for Omnicomm to support secure connections to devices
Work status
  • Attach files
  • Collin Heggerud
    May 27, 2025

    Also, note from Franz Berkemeier regarding NiSource:

    NiSource has an internal standard for TLS and they've asked how the planned backported DNP3 extension for SCADA 2021 is equipped to meet this standard.

    If the expectation is there with ES2021, we need to assume it is much stronger for newer versions.

  • Collin Heggerud
    Mar 3, 2025

    SNAM does require a release with Secure Sockets. This is required for the 2026 release.

    Additionally, we are getting more questions about DNP3's ability to support secure sockets and the SAV6 standard is due out this year which I believe requires secure sockets.

  • Collin Heggerud
    Sep 25, 2024

    "Their" response...

  • Collin Heggerud
    Sep 25, 2024

    Seems TMW had responded but had gotten my email address wrong, here is there response: Yes. We do provide Linux and Windows target layers that support TLS using OpenSSL.

  • Collin Heggerud
    Sep 25, 2024
  • Collin Heggerud
    Sep 25, 2024

    I was waiting for a response back from TMW before updating, but perhaps it is best not to wait. There are effectively two possibilities:

    • The TMW library supports TLS, in which case Omnicomm will (most likely) need to be extended to allow the protocol to establish and manage the connection.

    • The TMW library does NOT support TLS, in which case Omnicomm could possibly implement the TLS for us, and the protocol could just use the TLS connection. Alternatively, Omnicomm could still be extended to allow the protocol to establish and manage the connection.

    I can't think of a third possibility, so I believe that enhancements to Omnicomm are required (hence my earlier comment of "I can't imagine a scenario...") and a high priority.

    The remaining question is whether the enhancement can be a generic TLS that would work for multiple protocols (Secure Modbus, IEC870, DNP3, perhaps others), or whether Omnicomm would pass the responsibility to the protocol to manage the connection. I am not 100% certain that all TLS implementations are the same and whether Omnicomm can implement a generic enhancement. Perhaps an investigation, to establish requirements, is in order. But certainly there are other possibilities that would require protocol specific handling of the connection (imagine RSLinx for instance, or any library that implements the connection).

    I will also resend my email to TMW, but I will note that on their website it says "TLS is supported for IP based networks". This implies to me that TMW does support TLS and is able to manage the connection but I'm not sure if that means that TMW must manage the connection. Further, there will be serious performance requirements around validating certificates used in the TLS process, so any Omnicomm enhancements need to consider this (should be able to validate 2000 TLS connections and still be polling all devices within 20 seconds of going hot). On OPC UA we also implemented the ability to pre-validate certificates so that upon going hot, the certificates were already cached and there was no need to re-validate.

    Considering all of the above, I think there will be considerable incentive to allow the protocol to establish and manage the connection. Although, in the case of Secure Modbus, it would seem silly to require the protocol to implement a fairly standard TLS connection. So the ask is for both options.

  • Collin Heggerud
    Sep 16, 2024

    FYI, SNAM has requested that we implement IEC62351-3 and IEC62351-5 (as part of IEC60870-5-104). These require TLS. Depending on how the Advosol library implements this we may require a solution to this ticket for 2025. Actually, I can't imagine a scenario in which we don't require a solution. The alternative would be for us to implement similarly to how we implemented Sparkplug or OPC UA, but those have the unfortunate side-effect of nullifying the Enterprise SCADA backup connection configuration, which SNAM needs (this is not a problem for Sparkplug B due to the broker architecture, but is a problem for OPC UA). So the need for this will very likely soon be very high, for a release by mid-2025.