{"id":475,"date":"2019-10-25T14:51:43","date_gmt":"2019-10-25T14:51:43","guid":{"rendered":"http:\/\/opcconnect.integrationobjects.com\/?p=475"},"modified":"2026-04-03T15:11:10","modified_gmt":"2026-04-03T15:11:10","slug":"secure-opc-data-transfers","status":"publish","type":"post","link":"https:\/\/integrationobjects.com\/blog\/secure-opc-data-transfers\/","title":{"rendered":"Secure OPC Data Transfer Across Industrial Networks: A Complete Guide"},"content":{"rendered":"\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Securing OPC data transfers is one of the most pressing challenges in modern industrial automation. OPC Classic was built for closed, trusted networks &#8211; not the IT\/OT-integrated, cloud-connected environments most industrial organizations now operate. As industrial data pipelines stretch from PLCs and SCADA systems through enterprise IT networks and into cloud platforms, every hop in that journey is a potential security exposure.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">This guide explains why OPC data transfer security matters, what the specific risks are for OPC Classic and OPC UA environments, how a DCOM-free, encrypted architecture looks in practice, and how to implement it using proven industrial tools.<\/p>\r\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Why securing OPC data transfers is critical<\/h2>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">OPC data carries real-time process values, alarm states, historical trends, and equipment telemetry &#8211; the operational intelligence that drives production decisions, safety responses, and predictive maintenance. When that data is intercepted, tampered with, or disrupted, the consequences go beyond a data breach: they can affect physical processes, compromise safety systems, and cause operational downtime.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Three structural factors make OPC data transfer security particularly challenging:<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>OPC Classic&#8217;s dependence on DCOM.<\/strong> OPC DA, HDA, and AE use <a href=\"https:\/\/learn.microsoft.com\/en-us\/openspecs\/windows_protocols\/ms-dcom\/86b9cf84-df2e-4f0b-ac22-1b957627e1ca\">Microsoft&#8217;s DCOM<\/a> protocol for remote communication. DCOM was designed for closed, trusted Windows networks and has no native encryption. OPC traffic transmitted over raw DCOM can be intercepted by anyone with network access between the client and server machines. Beyond confidentiality, DCOM&#8217;s authentication model is weak by modern standards &#8211; a vulnerability Microsoft acknowledged with the <a href=\"https:\/\/integrationobjects.com\/blog\/windows-dcom-server-security-feature-bypass\/\">CVE-2021-26414<\/a> hardening update in 2023.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Expanding network perimeters.<\/strong> Industrial networks that were once fully air-gapped now connect to corporate IT networks, remote monitoring platforms, and cloud services for analytics, reporting, and AI-driven insights. Each new connection is a potential ingress point. Data flowing from a SCADA historian to an Azure or AWS environment crosses multiple network boundaries, each of which must be secured without disrupting data continuity.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Lack of encryption by default.<\/strong> Neither OPC Classic nor older OPC UA deployments always enforce encryption in practice. Many industrial installations run with OPC UA&#8217;s security mode set to &#8220;None&#8221; for simplicity, and OPC Classic has no encryption capability at all at the protocol level. This means sensitive process data often travels in plain text across networks that are less isolated than operators assume.<\/p>\r\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">OPC Classic vs OPC UA: security differences<\/h2>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Understanding the security gap between OPC Classic and OPC UA is essential before choosing a secure transfer approach.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>OPC Classic (DA, HDA, AE)<\/strong> has no built-in transport security. All remote communication goes through DCOM, which relies on Windows authentication and does not encrypt the data payload. Securing OPC Classic traffic requires either layering a tunneling solution on top (which provides encryption and <a href=\"https:\/\/integrationobjects.com\/blog\/dcom-vulnerability-opc-alarm-systems\/\">replaces DCOM)<\/a> or migrating to OPC UA entirely. Firewall traversal is complex &#8211; DCOM uses port 135 plus dynamic high ports, making it very difficult to lock down properly.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>OPC UA<\/strong> was designed with security as a core requirement. It uses its own TCP-based transport stack, supports TLS encryption, X.509 certificate-based authentication, and has three defined security modes: None, Sign, and Sign &amp; Encrypt. When correctly configured with Sign &amp; Encrypt mode, OPC UA provides strong end-to-end security without requiring any additional tunneling layer. However, &#8220;correctly configured&#8221; is the key phrase, many real-world OPC UA deployments run in None or Sign-only mode, leaving data unencrypted in transit.<\/p>\r\n<table style=\"height: 394px;\" width=\"692\">\r\n<tbody>\r\n<tr>\r\n<td width=\"208\">\r\n<p style=\"text-align: center;\">\u00a0<\/p>\r\n<\/td>\r\n<td width=\"208\"><strong>OPC Classic (DA\/HDA\/AE)<\/strong><\/td>\r\n<td width=\"208\"><strong>OPC UA<\/strong><\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"208\">\r\n<p>Native encryption<\/p>\r\n<\/td>\r\n<td width=\"208\">\r\n<p>None<\/p>\r\n<\/td>\r\n<td width=\"208\">\r\n<p>TLS (when configured)<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"208\">\r\n<p>Authentication<\/p>\r\n<\/td>\r\n<td width=\"208\">\r\n<p>Windows\/DCOM<\/p>\r\n<\/td>\r\n<td width=\"208\">\r\n<p>X.509 certificates<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"208\">\r\n<p>Firewall-friendly<\/p>\r\n<\/td>\r\n<td width=\"208\">\r\n<p>No (dynamic ports)<\/p>\r\n<\/td>\r\n<td width=\"208\">\r\n<p>Yes (single TCP port)<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"208\">\r\n<p>Security mode options<\/p>\r\n<\/td>\r\n<td width=\"208\">\r\n<p>None<\/p>\r\n<\/td>\r\n<td width=\"208\">\r\n<p>None \/ Sign \/ Sign &amp; Encrypt<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"208\">\r\n<p>Requires tunneling for security?<\/p>\r\n<\/td>\r\n<td width=\"208\">\r\n<p>Yes<\/p>\r\n<\/td>\r\n<td width=\"208\">\r\n<p>No (if properly configured)<\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">What a secure OPC data transfer architecture looks like<\/h2>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">A robust secure OPC data transfer architecture addresses three layers: transport security (how data moves), access control (who can read or write what), and reliability (what happens when the connection drops).<\/p>\r\n<h3 class=\"text-text-100 mt-2 -mb-1 text-base font-bold\">The reference architecture: OPC Easy Archiver + OPCNet Broker\u00ae<\/h3>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Integration Objects&#8217; <a class=\"underline underline underline-offset-2 decoration-1 decoration-current\/40 hover:decoration-current focus:decoration-current\" href=\"https:\/\/integrationobjects.com\/sioth-opc\/sioth-opc-data-archiving\/opc-easy-archiver\/\">OPC Easy Archiver<\/a> and <a class=\"underline underline underline-offset-2 decoration-1 decoration-current\/40 hover:decoration-current focus:decoration-current\" href=\"https:\/\/integrationobjects.com\/sioth-opc\/sioth-opc-tunneling\/opcnet-broker-da-hda-ae\/\">OPCNet Broker\u00ae<\/a> together form a complete, DCOM-free, encrypted OPC data pipeline. Here is how each component contributes and how they work together.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>OPCNet Broker\u00ae: secure DCOM-free transport layer<\/strong><\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><a href=\"https:\/\/integrationobjects.com\/blog\/category\/opc-tunneling\/\">OPCNet Broker\u00ae<\/a> sits on the OPC server side and replaces DCOM entirely as the communication transport. OPC clients connect to OPCNet Broker\u00ae locally (avoiding remote DCOM), and OPCNet Broker\u00ae handles all remote communication using a single, configurable TCP port &#8211; making firewall rules simple and predictable.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Security features OPCNet Broker\u00ae provides at the transport layer:<\/p>\r\n<ul class=\"[li_&amp;]:mb-0 [li_&amp;]:mt-1 [li_&amp;]:gap-1 [&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3\">\r\n<li class=\"whitespace-normal break-words pl-2\">Data encryption for all OPC traffic in transit, without requiring certificates<\/li>\r\n<li class=\"whitespace-normal break-words pl-2\">User authentication &#8211; only authorized users and applications can connect<\/li>\r\n<li class=\"whitespace-normal break-words pl-2\">IP whitelisting &#8211; connections are restricted to defined trusted hosts<\/li>\r\n<li class=\"whitespace-normal break-words pl-2\">Tag-level access control &#8211; each user&#8217;s browse, read, and write permissions can be defined down to individual OPC tags<\/li>\r\n<li class=\"whitespace-normal break-words pl-2\">OPC server redundancy management &#8211; automatic failover if the primary server becomes unavailable<\/li>\r\n<\/ul>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>OPC Easy Archiver: secure data collection and forwarding<\/strong><\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><a class=\"underline underline underline-offset-2 decoration-1 decoration-current\/40 hover:decoration-current focus:decoration-current\" href=\"https:\/\/integrationobjects.com\/blog\/category\/opc-data-archiving\/\">OPC Easy Archiver<\/a> connects to the OPC server (via OPCNet Broker\u00ae for OPC Classic, or directly for OPC UA) and collects real-time tag values, alarms, and events. It then forwards that data to its configured destination &#8211; a local SQL database, a CSV file store, an on-premise MQTT broker, or a cloud MQTT endpoint such as Azure IoT Hub &#8211; with store-and-forward buffering to handle network interruptions without data loss.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Key security and reliability capabilities OPC Easy Archiver provides:<\/p>\r\n<ul class=\"[li_&amp;]:mb-0 [li_&amp;]:mt-1 [li_&amp;]:gap-1 [&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3\">\r\n<li class=\"whitespace-normal break-words pl-2\">Encrypted forwarding to MQTT brokers (supporting MQTT 3.1 and 3.1.1 with TLS)<\/li>\r\n<li class=\"whitespace-normal break-words pl-2\">Store-and-forward: data is buffered locally if the destination is unreachable and retransmitted in order once connectivity is restored<\/li>\r\n<li class=\"whitespace-normal break-words pl-2\">Automatic reconnection to both OPC source and data destination<\/li>\r\n<li class=\"whitespace-normal break-words pl-2\">Support for multiple simultaneous destinations &#8211; local database, remote MQTT, and cloud endpoints concurrently<\/li>\r\n<li class=\"whitespace-normal break-words pl-2\">Publishing to Azure IoT Hub via MQTT, enabling integration with Azure Stream Analytics, Power BI, and AI\/ML pipelines<\/li>\r\n<\/ul>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>How they work together<\/strong><\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The combined architecture creates a complete, auditable data path from the OPC server all the way to cloud or enterprise destinations:<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">OPC Server \u2192 OPCNet Broker\u00ae (encrypted, authenticated, DCOM-free) \u2192 OPC Easy Archiver (collect, buffer, forward) \u2192 MQTT Broker \/ SQL Database \/ Azure IoT Hub<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">No DCOM touches the network. No unencrypted OPC traffic leaves the local machine. The firewall sees only one TCP port. Data gaps from network interruptions are automatically backfilled. And every access point &#8211; from which users can connect, to which tags they can read &#8211; is controlled and auditable.<\/p>\r\n\r\n\r\n\r\n<div class=\"wp-block-image\">\r\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-476 aligncenter\" src=\"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/10\/Easy-Archiver-ONB-DA-HDA-final-1024x977.jpg\" alt=\"Secure opc data transfers\" width=\"524\" height=\"500\" srcset=\"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/10\/Easy-Archiver-ONB-DA-HDA-final-1024x977.jpg 1024w, https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/10\/Easy-Archiver-ONB-DA-HDA-final-300x286.jpg 300w, https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/10\/Easy-Archiver-ONB-DA-HDA-final-768x733.jpg 768w, https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/10\/Easy-Archiver-ONB-DA-HDA-final.jpg 1136w\" sizes=\"auto, (max-width: 524px) 100vw, 524px\" \/><\/figure>\r\n<\/div>\r\n\r\n\r\n\r\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Deployment scenarios<\/h2>\r\n<h3 class=\"text-text-100 mt-2 -mb-1 text-base font-bold\">On-premise: secure OPC data transfer to local historian or SQL database<\/h3>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The simplest deployment uses OPCNet Broker\u00ae to secure and DCOM-free the connection between an OPC client (such as OPC Easy Archiver) and the OPC Classic server, with OPC Easy Archiver writing collected data to a local SQL Server, MySQL, or PostgreSQL database. This is suitable for plants that want to secure their existing OPC data collection without any cloud connectivity.<\/p>\r\n<h3 class=\"text-text-100 mt-2 -mb-1 text-base font-bold\">Multi-site: consolidating OPC data from remote locations<\/h3>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">For organizations with multiple industrial sites &#8211; offshore platforms, remote substations, distributed manufacturing facilities &#8211; OPC Easy Archiver at each site collects and buffers local OPC data, forwarding it over WAN or VSAT links to a central MQTT broker. OPCNet Broker\u00ae at each site ensures the OPC connection itself is secure and DCOM-free. Store-and-forward ensures no data is lost during link outages.<\/p>\r\n<h3 class=\"text-text-100 mt-2 -mb-1 text-base font-bold\">Hybrid cloud: OPC data to Azure IoT Hub or cloud MQTT<\/h3>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">OPC Easy Archiver can publish OPC tag data directly to Azure IoT Hub via MQTT, enabling cloud-based analytics, dashboards, and AI models to consume real-time industrial data. The OPC-to-cloud path is fully encrypted: OPCNet Broker\u00ae secures the OPC layer, and TLS secures the MQTT transport to the cloud endpoint. No raw OPC traffic ever leaves the plant network.<\/p>\r\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Best practices for securing OPC data transfers<\/h2>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Eliminate DCOM from remote OPC Classic connections.<\/strong> DCOM is the single largest OPC security liability. Any remote OPC Classic communication that can be replaced with an encrypted TCP tunnel should be. Use OPCNet Broker\u00ae or migrate to OPC UA via an OPC UA Wrapper.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Never run OPC UA in &#8220;None&#8221; security mode in production.<\/strong> The convenience of disabling OPC UA security for testing or commissioning often becomes permanent. Enforce Sign &amp; Encrypt mode on all production OPC UA servers and audit your existing deployments to identify any running without encryption.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Use tag-level access control, not just connection-level.<\/strong> Controlling which applications can connect to an OPC server is necessary but not sufficient. Defining per-user read, write, and browse permissions at the tag level, as OPCNet Broker\u00ae enables, prevents an authorized user from accessing data or issuing commands beyond their operational role.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Implement store-and-forward for all remote data paths.<\/strong> Any OPC data collection that crosses a WAN, VSAT, or unreliable network link should use store-and-forward buffering. Without it, network interruptions create data gaps in historians and MQTT streams that can corrupt analytics and compliance records.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Segment OPC traffic through a DMZ.<\/strong> Do not create direct routed paths between the OT network and corporate IT or cloud endpoints. Route OPC data through a DMZ intermediary, where it can be inspected, logged, and filtered before crossing zone boundaries.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Audit and monitor OPC data access.<\/strong> Know which clients are connecting to your OPC servers, which tags they are reading, and when. OPCNet Broker\u00ae provides connection and access logging that supports both security monitoring and compliance requirements.<\/p>\r\n\r\n\r\n\r\n<p>For more Information:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>OPC Easy Archiver:\u00a0<a href=\"https:\/\/integrationobjects.com\/sioth-opc\/sioth-opc-data-archiving\/opc-easy-archiver\/\">https:\/\/integrationobjects.com\/opc-products\/opc-data-archiving\/opc-easy-archiver\/<\/a><\/li>\r\n<li>OPCNet Broker:\u00a0<a href=\"https:\/\/integrationobjects.com\/sioth-opc\/sioth-opc-tunneling\/opcnet-broker-da-hda-ae\/\">https:\/\/integrationobjects.com\/opc-products\/opc-tunneling\/opcnet-broker-da-hda-ae\/<\/a><\/li>\r\n<\/ul>\r\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Frequently asked questions about secure OPC data transfer<\/h2>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><style>#sp-ea-1788 .spcollapsing { height: 0; overflow: hidden; transition-property: height;transition-duration: 300ms;}#sp-ea-1788.sp-easy-accordion>.sp-ea-single {margin-bottom: 10px; border: 1px solid #e2e2e2; }#sp-ea-1788.sp-easy-accordion>.sp-ea-single>.ea-header a {color: #444;}#sp-ea-1788.sp-easy-accordion>.sp-ea-single>.sp-collapse>.ea-body {background: #fff; color: #444;}#sp-ea-1788.sp-easy-accordion>.sp-ea-single {background: #eee;}#sp-ea-1788.sp-easy-accordion>.sp-ea-single>.ea-header a .ea-expand-icon { float: left; color: #444;font-size: 16px;}.sp-easy-accordion .sp-ea-single .ea-header a{\r\n  display: block;\r\n    text-decoration: none;\r\n    cursor: pointer;\r\n    font-weight: 600;\r\n    color: #444;\r\n    font-size: 16px;\r\n    line-height: 1;\r\n  box-shadow: none;}<\/style><div id=\"sp_easy_accordion-1775228805\"><div id=\"sp-ea-1788\" class=\"sp-ea-one sp-easy-accordion\" data-ea-active=\"ea-click\" data-ea-mode=\"vertical\" data-preloader=\"\" data-scroll-active-item=\"\" data-offset-to-scroll=\"0\"><div class=\"ea-card ea-expand sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-17880\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse17880\" aria-controls=\"collapse17880\" href=\"#\" aria-expanded=\"true\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-minus\"><\/i> What is the most secure way to transfer OPC Classic data across a network? <\/a><\/h3><div class=\"sp-collapse spcollapse collapsed show\" id=\"collapse17880\" data-parent=\"#sp-ea-1788\" role=\"region\" aria-labelledby=\"ea-header-17880\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW256944320 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW256944320 BCX0\">The most secure approach for OPC Classic is to eliminate DCOM entirely using an OPC tunneling solution like\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW256944320 BCX0\">OPCNet<\/span><span class=\"NormalTextRun SCXW256944320 BCX0\">\u00a0Broker\u00ae. This replaces DCOM with an encrypted, authenticated TCP connection through a single configurable port. All OPC DA, HDA, and AE traffic is encrypted in\u00a0<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW256944320 BCX0\">transit,<\/span><span class=\"NormalTextRun SCXW256944320 BCX0\">\u00a0access is controlled by user authentication and IP whitelisting, and tag-level permissions prevent unauthorized data access.<\/span><\/span><span class=\"EOP SCXW256944320 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-17881\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse17881\" aria-controls=\"collapse17881\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> Does OPC UA encryption make OPCNet Broker\u00ae unnecessary? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse17881\" data-parent=\"#sp-ea-1788\" role=\"region\" aria-labelledby=\"ea-header-17881\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW106921727 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW106921727 BCX0\">For pure OPC UA environments with properly configured Sign &amp; Encrypt security mode, OPC UA's native security stack is\u00a0<\/span><span class=\"NormalTextRun SCXW106921727 BCX0\">sufficient<\/span><span class=\"NormalTextRun SCXW106921727 BCX0\">\u00a0and\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW106921727 BCX0\">OPCNet<\/span><span class=\"NormalTextRun SCXW106921727 BCX0\">\u00a0Broker\u00ae is not\u00a0<\/span><span class=\"NormalTextRun SCXW106921727 BCX0\">required<\/span><span class=\"NormalTextRun SCXW106921727 BCX0\">\u00a0for the OPC layer. However,\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW106921727 BCX0\">OPCNet<\/span><span class=\"NormalTextRun SCXW106921727 BCX0\">\u00a0Broker\u00ae\u00a0<\/span><span class=\"NormalTextRun SCXW106921727 BCX0\">remains<\/span><span class=\"NormalTextRun SCXW106921727 BCX0\">\u00a0valuable in mixed environments where OPC Classic servers still exist, and it adds tag-level access control and redundancy management capabilities beyond what OPC UA security alone provides.<\/span><\/span><span class=\"EOP SCXW106921727 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-17882\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse17882\" aria-controls=\"collapse17882\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> What is store-and-forward and why does it matter for OPC data security? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse17882\" data-parent=\"#sp-ea-1788\" role=\"region\" aria-labelledby=\"ea-header-17882\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW83076712 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW83076712 BCX0\">Store-and-forward is a mechanism that buffers data locally when the destination (a MQTT broker, database, or cloud endpoint) is temporarily unreachable, then retransmits it in correct order once connectivity is restored. Without it, network interruptions create permanent gaps in your historian or cloud data stream. OPC Easy Archiver includes store-and-forward, ensuring that even in environments with unreliable WAN links, no process data is permanently lost<\/span><\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-17883\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse17883\" aria-controls=\"collapse17883\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> Can OPC data be sent securely to the cloud? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse17883\" data-parent=\"#sp-ea-1788\" role=\"region\" aria-labelledby=\"ea-header-17883\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW162993665 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW162993665 BCX0\">Yes. OPC Easy Archiver can publish OPC tag data to cloud MQTT endpoints, including Azure IoT Hub, using MQTT over TLS. Combined with\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW162993665 BCX0\">OPCNet<\/span><span class=\"NormalTextRun SCXW162993665 BCX0\">\u00a0Broker\u00ae securing the OPC Classic layer, this creates a fully encrypted path from the OPC server all the way to cloud analytics and AI platforms - with no unencrypted OPC traffic leaving the plant network.<\/span><\/span><span class=\"EOP SCXW162993665 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-17884\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse17884\" aria-controls=\"collapse17884\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> What is tag-level security in OPC and why is it important? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse17884\" data-parent=\"#sp-ea-1788\" role=\"region\" aria-labelledby=\"ea-header-17884\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW27142456 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW27142456 BCX0\">Tag-level security means defining access permissions - browse, read, and write - for individual OPC tags on a per-user basis, rather than simply controlling who can connect to the server. Without tag-level security, any authorized user can read all tags and potentially write to any writable tag.\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW27142456 BCX0\">OPCNet<\/span><span class=\"NormalTextRun SCXW27142456 BCX0\">\u00a0Broker\u00ae enables tag-level access control as an add-on, ensuring that operators, engineers, and external systems can only access the specific data they are authorized to see or\u00a0<\/span><span class=\"NormalTextRun SCXW27142456 BCX0\">modify<\/span><span class=\"NormalTextRun SCXW27142456 BCX0\">.<\/span><\/span><span class=\"EOP SCXW27142456 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-17885\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse17885\" aria-controls=\"collapse17885\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> What happens to OPC data if the network connection drops mid-transfer? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse17885\" data-parent=\"#sp-ea-1788\" role=\"region\" aria-labelledby=\"ea-header-17885\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW143913382 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW143913382 BCX0\">Without store-and-forward, data generated during a connection outage is lost. OPC Easy Archiver buffers data locally during outages - whether the OPC source or the destination is unreachable - and resumes delivery once the connection is restored. This ensures data continuity across unreliable network links without any manual intervention.<\/span><\/span><span class=\"EOP SCXW143913382 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-17886\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse17886\" aria-controls=\"collapse17886\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> Is it safe to run OPC UA with security mode set to \"None\"? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse17886\" data-parent=\"#sp-ea-1788\" role=\"region\" aria-labelledby=\"ea-header-17886\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW9893080 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW9893080 BCX0\">No, not in a production environment. Security mode None means all OPC UA traffic is transmitted unencrypted and unauthenticated. While it is sometimes used during commissioning and\u00a0<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW9893080 BCX0\">testing for<\/span><span class=\"NormalTextRun SCXW9893080 BCX0\">\u00a0simplicity, leaving it in place in production exposes all process data to interception by anyone on the network. Production OPC UA deployments should use Sign &amp; Encrypt security mode, enforced at the OPC UA server configuration level.<\/span><\/span><span class=\"EOP SCXW9893080 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><script type=\"application\/ld+json\">{ \"@context\": \"https:\/\/schema.org\", \"@type\": \"FAQPage\", \"@id\": \"sp-ea-schema-1788-69d9dc0cd0eed\", \"mainEntity\": [{ \"@type\": \"Question\", \"name\": \"What is the most secure way to transfer OPC Classic data across a network? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"The most secure approach for OPC Classic is to eliminate DCOM entirely using an OPC tunneling solution like\u00a0OPCNet\u00a0Broker\u00ae. This replaces DCOM with an encrypted, authenticated TCP connection through a single configurable port. All OPC DA, HDA, and AE traffic is encrypted in\u00a0transit,\u00a0access is controlled by user authentication and IP whitelisting, and tag-level permissions prevent unauthorized data access.\u00a0\" } },{ \"@type\": \"Question\", \"name\": \"Does OPC UA encryption make OPCNet Broker\u00ae unnecessary? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"For pure OPC UA environments with properly configured Sign &amp; Encrypt security mode, OPC UA's native security stack is\u00a0sufficient\u00a0and\u00a0OPCNet\u00a0Broker\u00ae is not\u00a0required\u00a0for the OPC layer. However,\u00a0OPCNet\u00a0Broker\u00ae\u00a0remains\u00a0valuable in mixed environments where OPC Classic servers still exist, and it adds tag-level access control and redundancy management capabilities beyond what OPC UA security alone provides.\u00a0\" } },{ \"@type\": \"Question\", \"name\": \"What is store-and-forward and why does it matter for OPC data security? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"Store-and-forward is a mechanism that buffers data locally when the destination (a MQTT broker, database, or cloud endpoint) is temporarily unreachable, then retransmits it in correct order once connectivity is restored. Without it, network interruptions create permanent gaps in your historian or cloud data stream. OPC Easy Archiver includes store-and-forward, ensuring that even in environments with unreliable WAN links, no process data is permanently lost\" } },{ \"@type\": \"Question\", \"name\": \"Can OPC data be sent securely to the cloud? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"Yes. OPC Easy Archiver can publish OPC tag data to cloud MQTT endpoints, including Azure IoT Hub, using MQTT over TLS. Combined with\u00a0OPCNet\u00a0Broker\u00ae securing the OPC Classic layer, this creates a fully encrypted path from the OPC server all the way to cloud analytics and AI platforms - with no unencrypted OPC traffic leaving the plant network.\u00a0\" } },{ \"@type\": \"Question\", \"name\": \"What is tag-level security in OPC and why is it important? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"Tag-level security means defining access permissions - browse, read, and write - for individual OPC tags on a per-user basis, rather than simply controlling who can connect to the server. Without tag-level security, any authorized user can read all tags and potentially write to any writable tag.\u00a0OPCNet\u00a0Broker\u00ae enables tag-level access control as an add-on, ensuring that operators, engineers, and external systems can only access the specific data they are authorized to see or\u00a0modify.\u00a0\" } },{ \"@type\": \"Question\", \"name\": \"What happens to OPC data if the network connection drops mid-transfer? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"Without store-and-forward, data generated during a connection outage is lost. OPC Easy Archiver buffers data locally during outages - whether the OPC source or the destination is unreachable - and resumes delivery once the connection is restored. This ensures data continuity across unreliable network links without any manual intervention.\u00a0\" } },{ \"@type\": \"Question\", \"name\": \"Is it safe to run OPC UA with security mode set to &quot;None&quot;? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"No, not in a production environment. Security mode None means all OPC UA traffic is transmitted unencrypted and unauthenticated. While it is sometimes used during commissioning and\u00a0testing for\u00a0simplicity, leaving it in place in production exposes all process data to interception by anyone on the network. Production OPC UA deployments should use Sign &amp; Encrypt security mode, enforced at the OPC UA server configuration level.\u00a0\" } }] }<\/script><\/div><\/div><\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>Securing OPC data transfers is one of the most pressing challenges in modern industrial automation. OPC Classic was built for closed, trusted networks &#8211; not<\/p>\n","protected":false},"author":1,"featured_media":1688,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[185],"tags":[53,49],"class_list":["post-475","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-opc-tunneling","tag-opc-easy-archiver","tag-opcnet-broker"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Secure OPC Data Transfer: DCOM-Free &amp; Encrypted Guide<\/title>\n<meta name=\"description\" content=\"Learn how to secure OPC data transfers across industrial networks without DCOM, with encryption, authentication, and reliable delivery to cloud or on-premise.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/integrationobjects.com\/blog\/secure-opc-data-transfers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure OPC Data Transfer: DCOM-Free &amp; Encrypted Guide\" \/>\n<meta property=\"og:description\" content=\"Learn how to secure OPC data transfers across industrial networks without DCOM, with encryption, authentication, and reliable delivery to cloud or on-premise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/integrationobjects.com\/blog\/secure-opc-data-transfers\/\" \/>\n<meta property=\"og:site_name\" content=\"OPC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Integration.Objects.OPC\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-25T14:51:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-03T15:11:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/10\/Secure-your-OPC-data-transfers-from-OPC-servers-into-databases.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"OPCBlogAdmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IntegObjects\" \/>\n<meta name=\"twitter:site\" content=\"@IntegObjects\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"OPCBlogAdmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure OPC Data Transfer: DCOM-Free & Encrypted Guide","description":"Learn how to secure OPC data transfers across industrial networks without DCOM, with encryption, authentication, and reliable delivery to cloud or on-premise.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/integrationobjects.com\/blog\/secure-opc-data-transfers\/","og_locale":"en_US","og_type":"article","og_title":"Secure OPC Data Transfer: DCOM-Free & Encrypted Guide","og_description":"Learn how to secure OPC data transfers across industrial networks without DCOM, with encryption, authentication, and reliable delivery to cloud or on-premise.","og_url":"https:\/\/integrationobjects.com\/blog\/secure-opc-data-transfers\/","og_site_name":"OPC Blog","article_publisher":"https:\/\/www.facebook.com\/Integration.Objects.OPC\/","article_published_time":"2019-10-25T14:51:43+00:00","article_modified_time":"2026-04-03T15:11:10+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/10\/Secure-your-OPC-data-transfers-from-OPC-servers-into-databases.jpg","type":"image\/jpeg"}],"author":"OPCBlogAdmin","twitter_card":"summary_large_image","twitter_creator":"@IntegObjects","twitter_site":"@IntegObjects","twitter_misc":{"Written by":"OPCBlogAdmin","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/integrationobjects.com\/blog\/secure-opc-data-transfers\/","url":"https:\/\/integrationobjects.com\/blog\/secure-opc-data-transfers\/","name":"Secure OPC Data Transfer: DCOM-Free & Encrypted Guide","isPartOf":{"@id":"https:\/\/integrationobjects.com\/blog-\/#website"},"primaryImageOfPage":{"@id":"https:\/\/integrationobjects.com\/blog\/secure-opc-data-transfers\/#primaryimage"},"image":{"@id":"https:\/\/integrationobjects.com\/blog\/secure-opc-data-transfers\/#primaryimage"},"thumbnailUrl":"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/10\/Secure-your-OPC-data-transfers-from-OPC-servers-into-databases.jpg","datePublished":"2019-10-25T14:51:43+00:00","dateModified":"2026-04-03T15:11:10+00:00","author":{"@id":"https:\/\/integrationobjects.com\/blog-\/#\/schema\/person\/6efbaf488a07e418b93ff77f00af386b"},"description":"Learn how to secure OPC data transfers across industrial networks without DCOM, with encryption, authentication, and reliable delivery to cloud or on-premise.","breadcrumb":{"@id":"https:\/\/integrationobjects.com\/blog\/secure-opc-data-transfers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/integrationobjects.com\/blog\/secure-opc-data-transfers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/integrationobjects.com\/blog\/secure-opc-data-transfers\/#primaryimage","url":"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/10\/Secure-your-OPC-data-transfers-from-OPC-servers-into-databases.jpg","contentUrl":"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/10\/Secure-your-OPC-data-transfers-from-OPC-servers-into-databases.jpg","width":1920,"height":1080,"caption":"secure OPC data transfer"},{"@type":"BreadcrumbList","@id":"https:\/\/integrationobjects.com\/blog\/secure-opc-data-transfers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/integrationobjects.com\/blog-\/"},{"@type":"ListItem","position":2,"name":"Secure OPC Data Transfer Across Industrial Networks: A Complete Guide"}]},{"@type":"WebSite","@id":"https:\/\/integrationobjects.com\/blog-\/#website","url":"https:\/\/integrationobjects.com\/blog-\/","name":"OPC Blog","description":"OPC and related technologies news from Integration Objects","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/integrationobjects.com\/blog-\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/integrationobjects.com\/blog-\/#\/schema\/person\/6efbaf488a07e418b93ff77f00af386b","name":"OPCBlogAdmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/integrationobjects.com\/blog-\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f2d787c3c48eb147d5b4d0c9d05c6f35a5946c7dc40af2eedbe64030e99ea299?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f2d787c3c48eb147d5b4d0c9d05c6f35a5946c7dc40af2eedbe64030e99ea299?s=96&d=mm&r=g","caption":"OPCBlogAdmin"}}]}},"_links":{"self":[{"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/posts\/475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/comments?post=475"}],"version-history":[{"count":6,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/posts\/475\/revisions"}],"predecessor-version":[{"id":1689,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/posts\/475\/revisions\/1689"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/media\/1688"}],"wp:attachment":[{"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/media?parent=475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/categories?post=475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/tags?post=475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}