Overview #
The Configure phase is the first step in preparing any FactoryNebula device for use. It ensures that every device arrives fully ready for deployment and that all applications, security settings and data connections are correctly defined before the device is powered on.
Purpose of the Configure Phase #
The Configure phase creates a reliable foundation for every installation. By preparing devices in advance, the user avoids manual on site setup and reduces the time needed to place new equipment into production. This approach also ensures that all deployed devices follow the same configuration standards.
Remote Preparation Through the Cloud Manager #
All configuration work is performed in the FactoryNebula Cloud Manager. Users can assign roles to devices, select applications, define data sources and prepare communication settings without direct access to the hardware. When a device is powered on for the first time it retrieves its assigned configuration and applies it automatically.
Selecting Applications and Functions #
Each device can run one or more FactoryNebula applications. Examples include machine data collectors, HMI interfaces, process analysis tools, low code automation, dashboards and many others. During configuration the user selects the required applications and defines their parameters. These parameters are stored centrally which ensures identical behavior across multiple devices.
Defining Machine and Data Connections #
Connectivity settings determine how the device interacts with machines and external systems. The user can select industrial protocols, define data endpoints and prepare connections to cloud platforms or on site data environments. Configuration templates make it possible to create a single standard setup and apply it to many devices at once.
Security and Identity Management #
Every device receives a unique identity controlled by the Cloud Manager. Certificates are created automatically and verify the relationship between the device and the cloud environment. This process ensures secure communication and prevents unauthorized devices from entering the network. All required security material is applied during configuration so that commissioning remains simple and consistent.
Outcome of the Configure Phase #
By completing the Configure phase each device becomes fully prepared for activation. Once connected to power and network it will authenticate itself, load its configuration and begin operation without the need for local adjustments. This provides a predictable and efficient workflow that supports both small scale and large scale industrial environments.