Web User Interface: WebUI
  • 12 Apr 2024
  • 7 Minutes to read
  • PDF

Web User Interface: WebUI

  • PDF

Article Summary

Introduction

WebUI is the interface used to configure N3uron and can also be used to quickly monitor any data collected by N3uron. WebUI is a pure HTML5 web application, meaning that it can be opened in any modern web browser, which makes it very convenient for remote access. 

By default, WebUI can be reached using plain HTTP (port 8003 by default) and secure HTTPS (port 8443 by default). To force secure connections only, HTTP mode can be disabled. 

WebUI is automatically installed in N3uron and does not require a license. More than one instance of the WebUI can be created in the same node, which is especially useful for customizing access roles (for instance, when configuring a different logo, access from different networks, etc.). In this case, all new instances would run in demo mode unless a valid license is provided.

To access N3uron WebUI you will require a web browser. Use the machine’s IP and the port that was configured for the WebUI during setup (by default, 8003 for HTTP or 8443 for HTTPS).

Figure 1- Access Panel


After N3uron installation, the default users/passwords configured within N3uron are as follows:


Full access
Read-only access
User:adminuser
Password:n3uronn3uron
Note:
To access N3uron WebUI from a different machine, make sure that the Windows Firewall on the host machine is not blocking the port that was assigned to N3uron WebUI during setup.


WebUI has the following sections:

  • Data:
    • Real-Time: Displays the values of all collected data, along with the quality, timestamp, and description.
    • Historical: Allows users to create charts displaying the historical values of all tags and export data to CSV files. Historical data stored in other linked nodes can be retrieved and displayed also.
  • Alarms:
    • Real-Time: Displays the current status of alarms.
    • Historical: Allows users to retrieve the events related to alarms from the historical database.
  • System:
    • Diagnostics: Displays the current status of each node and its components.
    • Config: Allows users to configure the node and all its components.
    • Licensing: Displays licensing information and allows licenses to be applied to each node.

Configuration 

One of the first steps after installing N3uron is to configure the WebUI.

WebUIConf

The different parameters that can be configured to suit each user's needs and customize access to the node are as follows:

  • Session timeout: Timeout (in seconds) manages user inactivity and offline session memory storage. User sessions will expire after this period of inactivity. 0 will disable inactivity checks. If a user session loses connection, session data will be retained in the memory so that it can be recovered when the user reconnects. Session data will be erased after the timeout elapses. 0 will set a default timeout of 12 hours to avoid memory leaks.
  • Config lock timeout: This parameter specifies the amount of time (in seconds) a user can keep a config file locked while not modifying it.

Note
A lock is also released when the user session expires. This means that if the Lock timeout is greater than the Session timeout, the lock may be released because of session expiration instead of lock expiration.

  • Data refresh interval: The interval at which the data is polled from the server, in milliseconds.
  • Max history tags: To avoid performance problems when retrieving a huge amount of historical data, the number of tags loaded in one single chart can be limited with this parameter. Example:
    • Max history tags = 20 means the maximum amount of tags loaded in one single chart is limited to 20.
  • Default expanded levels: Depth of the automatically expanded levels in the real-time tree.
  • Default selected menu: Default selected menu at starting.
  • Server: 
    • Mode: Select how the web server will accept connections: users can select HTTP, HTTPS, or both.
    • HTTP:
      • TCP port: This parameter specifies the port number to open the web interface. The valid range is 1 to 65535. The default setting is 8003.
Note    
Please make sure the port is not used by any other application on the same machine.

  • Network interface: Here you must specify the interface through which the module will be accessible via HTTP:
    • All interfaces: The HTTP server will listen for connections on all interfaces.
    • Localhost only: The HTTP server will listen only for localhost connections.
    • You can also input a custom address.
  • HTTPS:
    • TCP port: This parameter specifies the HTTPS port number for opening the web interface. The valid range is 1 to 65535. The default setting is 8443
Note
Please make sure the port is not used by any other application in the same machine.

  • Network interface: Here you must specify the interface through which the module will be accessible via HTTPS:
    • All interfaces: The HTTPS server will listen for connections on all interfaces.
    • Localhost only: The HTTPS server will listen only for localhost connections.
    • You can also input a custom address.
  • Self-signed generator popup:
Note:
This feature is available from N3uron version 1.21.8.

To establish HTTPS connections using custom self-sign.0d flexibility and control over the certificate generation process.
WebUICSR

To open the self-signed certificate generator popup, right-click on the icon next to the HTTPS title section, and then fill out the form.

  • Common Name: The fully qualified domain name (FQDN) for which the certificate is being requested. This is typically the domain name of the server where the certificate will be installed (e.g., www.example.com).
  • Organization Name: The legal name of the organization or company that is requesting the certificate.
  • Organization Department: The specific department or division within the organization that is requesting the certificate.
  • Email: The email address associated with the organization or individual requesting the certificate.
  • Country: The two-letter ISO code representing the country where the organization is located (e.g., US for United States, CA for Canada, ES for Spain).
  • State: The full name or abbreviation of the state or province where the organization is located.
  • Locality: The city or locality where the organization is located.
  • Street: The street address of the organization's physical location.
  • Postal Code: The postal or ZIP code of the organization's location.
  • Key Size: The size of the cryptographic key pair to be generated for the certificate, measured in bits. Common key sizes include 2048 bits or 4096 bits.
  • Expiration Days: The number of days until the certificate expires. This determines the validity period of the certificate before it needs to be renewed.

When filling out the form to generate the CSR, ensure that all information provided is accurate and matches the organization's official details. This information will be embedded in the CSR and subsequently used to issue the SSL/TLS certificate.
custom-certificates-csr-generator-https-connections-1.21.8


  • Certificate type: Select the server HTTPS certificate:
    • Self-signed: The server willautomatically create and sign a certificate using an internal certification authority, which can be downloaded by clicking on the ellipsis button on the right side of the Self-signed certificate field, as shown below: Figure - Self certificate WebUI


      This certification authority is valid for all module instances and must be imported into all the system/web clients that will be used to access WebUI via HTTPS.
  • Embedded: The user will provide certificate files.
  • File path: The user will provide certificate file paths relative to the module data/cert folder.

You can read about how to import the self-signed certificate authority in the appendix at the end of this article.

  • Self signed certificate:
    • Certified hosts: Comma-separated host list (domains/host names and/or IPs) that will be included in the autogenerated SSL certificate. It is important to include all the hosts from the machine where the WebUI will be accessed so that the web client does not return any errors. Hosts 127.0.0.1, localhost, and system hostname will automaticallybe added to the certificate.
  • Header:
    • Logo: The logo that will be shown on the right side of the header. If no logo is selected, the one in config/files/logo.png will automatically be loaded.
    • Text: The title of the web interface is displayed on the top-left side of the window. This is an easy way to identify the node. If left empty, the node name will be shown instead.
  • Menu visibility:
    • Data > Real Time: When disabled, the Data > Real Time menu element will be hidden.
    • Data > Historical: When disabled, the Data > Historical menu element will be hidden.
    • Alarms > Real Time: When disabled, the Alarms > Real Time menu element will be hidden.
    • Alarms > Historical: When disabled, the Alarms > Historical menu element will be hidden.
    • Diagnostics: When disabled, the Diagnostics menu element will be hidden.
    • Config: When disabled, the Config menu element will be hidden. 
    • Licensing: When disabled, the Licensing menu element will be hidden. 

Access

In this area, you will assign the corresponding permissions to the Roles previously created in the Roles section. 


Figure 3-Giving-the-corresponding-permissions


Parameters:

  • Enabled: A disabled role will block any login attempt.
  • Permissions:
    • Data >  Real Time:
      • View: The user will be able to view tags in real time.
      • Edit: The user will be able to write values to tags with write access.
    • Data >  Historical:
      • View: The user will be able to view a tag's historical data and save/load private configurations.
      • Edit: The user will also be able to save/load public configurations.
    • Alarms >  Real Time:
      • View: The user will be able to view alarms in real-time.
      • Edit: The user will be able to ack alarms.
    • Alarms >  Historical:
      • View/Edit: The user will be able to view alarm historical data.
    • Diagnostics:
      • View: The user will be able to view modules and link information in real-time.
      • Edit: The user will also be able to start/stop modules.
    • Config:
      • View: The user will be able to view configurations.
      • Edit: The user will also be able to modify configurations.
    • Licensing:
      • View: The user will be able to view licenses.
      • Edit: The user will also be able to save/remove licenses.

Appendix: How to import the self-signed certification authority

Windows (Chrome and Internet Explorer)

  • Step 1: Open the certificate.
  • Step 2: Click on Install Certificate... and then click Next.
  • Step 3: Select to place the certificate in a store and click Browse.
  • Step 4: Select Trusted Root Certification Authorities and click OK.
  • Step 5: Click Next and Finish.

Firefox

  • Step 1: Click on the top right menu and go to Options.
  • Step 2: Go to Advanced and click on the Certificates tab.
  • Step 3: Click View Certificates and go to the Authorities tab.
  • Step 4: Click Import... and load the certificate.

Was this article helpful?