Fact-checked by Grok 2 weeks ago

OPC Unified Architecture

OPC Unified Architecture (OPC UA) is a platform-independent, standard designed for secure, reliable, and data exchange in industrial automation and control systems. Developed by the and released in 2008, it unifies and extends the functionalities of prior OPC Classic specifications into a single, extensible framework that supports communication from sensors and devices to enterprise and cloud applications. Standardized internationally as IEC 62541, OPC UA ensures manufacturer- and platform-neutral across operating systems like Windows, , and embedded environments, as well as hardware from PLCs to microcontrollers. At its core, OPC UA employs a multi-layered that includes , session, and application layers to facilitate client-server and publish-subscribe (PubSub) communication models. This design enables robust features such as automatic discovery of servers, subscriptions, event notifications, and remote method invocations, all while maintaining with legacy OPC systems through wrappers. is a foundational element, incorporating certificate-based , message signing, , and auditing to protect against unauthorized access and tampering in industrial networks. The uses an object-oriented approach to represent complex data as nodes in an , allowing for semantic modeling that supports advanced and integration with technologies like Industry 4.0 and the (IIoT). OPC UA's extensibility is enhanced by over 150 Companion Specifications, which tailor the core standard to specific industries such as , , , and pharmaceuticals, ensuring domain-specific . Adopted globally, it powers machine-to-machine communication in diverse applications, from process control and to cloud-based , with programs verifying compliance to promote widespread ecosystem reliability. Ongoing developments, including updates to the IEC 62541 series, continue to address emerging needs like enhanced PubSub for systems and integration with .

History and Development

Origins and Evolution

The OPC Classic specifications emerged in the mid-1990s as a set of standards for in industrial automation, primarily relying on Microsoft's (COM) and (DCOM) for data exchange between devices and software applications. This architecture, while effective for early Windows-based systems, imposed significant limitations, including tight coupling to the Windows operating system, which restricted deployment on other platforms; scalability challenges in distributed environments due to DCOM's difficulties with network firewalls and remote connections; and the absence of built-in security mechanisms, leaving communications vulnerable to interception and unauthorized access. In response to these constraints and the evolving demands of industrial systems, the OPC Foundation was formed in 1996 as a non-profit organization dedicated to developing and maintaining open, multi-vendor standards for process control and manufacturing automation. Initially comprising leading automation companies such as Fisher-Rosemount, Rockwell Software, and others, the Foundation focused on unifying disparate protocols under a common framework, releasing the first OPC Classic Data Access (DA) specification in August 1996 to enable seamless data sharing across heterogeneous systems. Over the subsequent years, it expanded the Classic suite to include specifications for alarms, events, historical data, and batch processes, solidifying OPC's role in standardizing industrial communications. By the early 2000s, the limitations of OPC Classic became increasingly apparent amid the push for more interconnected, secure, and platform-agnostic industrial networks, prompting the to initiate the OPC Unified Architecture (UA) project. The first OPC UA working group convened in November 2003, with development accelerating to address multi-platform compatibility, deficiencies, and the need for reliable performance in industrial applications. The project's core aim was to create a successor that unified the functionalities of OPC Classic while overcoming its technological dependencies, culminating in the release of OPC UA version 1.0 in July 2006. Central to OPC UA's early design were principles of (SOA), which facilitated modular, request-response interactions between clients and servers; platform independence, enabling operation across diverse hardware like PCs, embedded controllers, and operating systems including Windows, , and real-time kernels; and extensibility, allowing customization for specific industrial sectors through layered information models without disrupting core compatibility. These foundations positioned OPC UA as a forward-looking standard for secure, scalable data exchange in modern automation environments.

Key Milestones and Versions

The development of OPC Unified Architecture (OPC UA) began in 2003 when the OPC Foundation formed a working group to create a platform-independent successor to OPC Classic, addressing the need for broader interoperability across devices and systems. The initial specification parts were released on July 28, 2006, as version 1.00, introducing core features such as client-server architecture, a security model, data access services, event handling, alarms, historical data access, and support for both XML and binary encoding, which laid the foundation for secure, service-oriented communication in industrial automation. In February 2009, version 1.01 was released, providing clarifications and enhancements to the initial specification while completing the first phase of development; this version also saw the debut of the first companion specification for analyzer devices, marking early industry-specific adoption. Around the same time, in 2009, the initiated collaboration with the (IEC) to standardize OPC UA internationally, culminating in its adoption as the IEC 62541 series, with initial parts published between 2010 and 2011. Version 1.02 followed in 2012, enhancing security through support for 256-bit encryption and transport, alongside the introduction of a discovery server for improved service location, thereby boosting in distributed environments. Version 1.03, released in 2015, advanced certificate management and introduced the Global Discovery Server (GDS) concept for scalable device registration and trust establishment; this aligned closely with the IEC 62541:2015 publication, solidifying OPC UA's status as an and expanding its use in sectors like machinery and process control through companion specifications such as those for (2010) and ISA-95 (2013). In 2017, version 1.04 was issued on November 22, formalizing the publish-subscribe (PubSub) mechanism with UDP-based messaging for real-time data distribution, along with encoding and transport support, which significantly improved scalability and integration with ecosystems while enhancing cross-vendor interoperability. Subsequent amendments in 2019 to version 1.04 added features like (ECC) for stronger security policies. The progression to the 1.05 series began in with version 1.05.00, incorporating support for method arguments in ; this was followed by 1.05.01 and 1.05.02 in 2022, which refined encoding, introduced network message models, and added scheduling capabilities for PubSub. In 2023, version 1.05.03 brought enhancements for redundancy and 5.0 compatibility, further supporting resilient, cloud-integrated applications. Companion specifications continued to proliferate, with over 150 developed as of 2025 for industries including automotive (e.g., OPC 40400-1 ) and machinery (e.g., OPC 40001-1), demonstrating OPC UA's expanding role in sector-specific . The latest release, version 1.05.06 on October 31, 2025, includes refinements to the overview and concepts (Part 1), model (Part 2), and core services across multiple parts, ensuring ongoing alignment with evolving needs for secure and efficient data exchange.

Specifications and Standards

Core Specifications

The OPC UA specification is a modular, multi-part standard developed by the , consisting of core parts numbered OPC 10000-1 through OPC 10000-18 and beyond, which collectively define the foundational elements for secure, platform-independent communication. These parts interrelate to form a cohesive framework, where foundational models in earlier parts support advanced features in later ones, enabling scalable implementations across devices and systems. Part 1 (Overview and Concepts) introduces the high-level architecture of OPC UA, including its service-oriented design, integrated models for data, alarms, events, history, and programs, as well as key principles like and extensibility. Part 2 (Security Model) outlines the conceptual framework for , , and to ensure secure , without specifying implementation details. Part 3 (Address Space Model) defines the structure for organizing as a network of nodes connected by references, supporting , querying, and description. Part 4 (Services) specifies the abstract service set, such as Read, Write, Browse, and Subscribe, that clients use to interact with servers in a request-response manner. Part 5 () establishes base types like ObjectTypes, VariableTypes, and ReferenceTypes, providing a foundation for modeling real-world entities and their relationships. Subsequent parts build on these foundations for specialized functionality. Part 6 (Mappings) describes how OPC UA integrates with classic OPC specifications, enabling by mapping legacy data models to the UA . Part 13 (Aggregates) introduces concepts for computing aggregate values, such as averages or totals, over time-series to support analytical processing. Part 14 (PubSub) extends the core services with publish-subscribe paradigms for messaging, facilitating efficient distribution in distributed systems. The specifications enable extensibility by allowing companion specifications to define industry-specific information models that extend the core address space with domain-relevant types and namespaces. For instance, the Device Integration (DI) companion specification models device identification, parameters, and functionality, while the PLCopen companion specification addresses and tasks based on IEC 61131-3. These companions ensure across vertical markets by reusing core types and validating against standardized nodesets. The provides all core specifications, companion specifications, XML schemas for data types and serialization, and nodeset XML files for validation as freely downloadable resources under the , supporting development and conformance testing. These specifications are also formalized as the IEC 62541 series.

IEC 62541 Integration

The adoption of OPC Unified Architecture (OPC UA) into the (IEC) standards began with the publication of the first technical report, IEC TR 62541-1, in 2010, which provided an overview and concepts of the specification developed by the . Subsequent core parts followed in 2011, including IEC 62541-4 on services and IEC 62541-5 on the , marking the initial formalization of OPC UA as an . By 2015, an updated edition aligned with OPC UA version 1.03 was released, incorporating enhancements such as management and incorporating new parts for historical access and aggregates. The full series of IEC 62541 parts, spanning Parts 1 through 18 and mirroring the OPC Foundation's OPC 10000 specifications, continues to be updated, with Part 18 (Role-Based Security) published in August 2025 to reflect OPC UA version 1.05 features including publish-subscribe mechanisms. Updates continued to align with OPC UA 1.05, released in 2021 and further refined to sub-version 1.05.06 as of October 2025, ensuring synchronization between the documents and IEC standards. Specific IEC 62541 parts directly correspond to key OPC UA functionalities, facilitating standardized . For instance, IEC TR 62541-2 defines the model, addressing threats in physical, hardware, and software environments, and aligns with OPC UA's policies and handling. IEC 62541-10 specifies the for Programs, enabling the modeling and execution of executable code within OPC UA servers, including NodeClasses and Attributes for program state management. Recent updates post-2023, such as those in IEC 62541-14 for publish-subscribe extensions, support cloud-based deployments by enhancing scalability for distributed systems and integration with protocols like for edge-to-cloud communication. These parts maintain a one-to-one mapping with OPC UA core specifications, such as Part 4 Services, but adapt terminology and structure to IEC formatting requirements. Certification and compliance ensure under the IEC framework, with the OPC Foundation's playing a central role. Established in 2011, the includes rigorous testing at accredited labs for compliance with IEC 62541 profiles, covering aspects like , , and communication stacks to verify robustness and platform independence. testing involves automated and manual validation against the standard's conformance units, ensuring products adhere to specified behaviors without proprietary extensions. The IEC's endorsement as an amplifies global adoption, particularly in industries requiring certified equipment for , such as and sectors, by promoting widespread use in multinational projects. The IEC 62541 versions exhibit minimal differences from the original OPC UA specifications, primarily consisting of editorial adjustments for international normative alignment, such as revised forewords, terminology harmonization with IEC conventions, and minor clarifications in annexes without altering technical content. These changes ensure the standards meet global publication requirements while preserving functional equivalence, allowing seamless transition between OPC Foundation and IEC documents for developers and implementers.

Architecture and Components

Communication Stack

The OPC UA communication stack is organized as a multi-layered that facilitates secure and reliable exchange between clients and servers, or among peers in publish-subscribe scenarios. This design separates concerns across distinct layers, enabling flexibility in implementation and transport choices while maintaining . The stack supports both request-response interactions typical of client-server models and one-to-many messaging for applications, ensuring across environments. At the core of the stack is the , which defines the OPC UA services such as Read, Write, and Subscribe that allow clients to interact with resources like nodes and variables. These services are specified in OPC 10000-4 and operate independently of underlying transport details, using a standardized to abstract application logic from the communication mechanics. Below this lies the encoding layer, responsible for serializing and deserializing messages into formats that ensure consistent data representation across heterogeneous systems; it supports three primary encodings—OPC UA Binary for efficiency, OPC UA XML for readability, and OPC UA JSON for web-friendly integration—as detailed in OPC 10000-6 Clause 5. The transport layer then handles message delivery, offering multiple protocols including OPC UA TCP for low-latency local networks, for secure web-based access, WebSockets for bidirectional persistent connections, and for lightweight, multicast-enabled publish-subscribe over local area networks, as outlined in OPC 10000-6 Clause 7. Client-server interactions rely on sessions to establish for calls, where a client creates a session over a to authenticate and maintain stateful communication with the . Subscriptions within this model allow clients to register for notifications on changes or events, reducing polling overhead by enabling the server to updates at configurable intervals, of the underlying . For distribution, the publish-subscribe (PubSub) model—introduced in OPC UA version 1.04—extends this capability to a brokerless or brokered paradigm, using for deterministic, high-throughput scenarios in distributed systems. This PubSub approach, defined in OPC 10000-14, supports by decoupling publishers from multiple subscribers, facilitating efficient flow in large-scale industrial networks without session dependencies. The stack's protocol independence is a key design principle, allowing applications to select transports based on network constraints, such as using or WebSockets to traverse firewalls in settings while preserving end-to-end through integrated secure channels. This enhances in distributed systems, where server-to-server chaining or PubSub topologies can aggregate data across hierarchies without proprietary bindings. Recent enhancements in version 1.05 include mappings for and AMQP in the PubSub layer, enabling seamless integration with IIoT ecosystems by leveraging these lightweight brokers for cloud connectivity and edge-to-cloud data routing. Security mechanisms, such as encrypted channels, are layered atop these transports to ensure confidentiality during transmission.

Security Model

The OPC UA security model provides a layered framework to ensure authentication, authorization, integrity, and confidentiality in industrial communications, operating across the application and communication layers. At the application layer, it handles user authentication and authorization through session services, while the communication layer establishes secure channels using digital certificates to protect data exchange. This architecture supports flexible security configurations tailored to operational needs, from unsecured testing environments to highly protected production systems. Core security policies define the levels of protection applied to messages within secure channels, including SignAndEncrypt, which mandates both message signing for and for ; , which applies only signing to verify without ; and None, which disables security features entirely for non-sensitive scenarios. and rely on v3 certificates, where applications present these certificates during secure channel establishment to prove identity, and servers maintain trust lists to validate peer certificates, enabling in high-security setups. User identity tokens, such as certificates, usernames/passwords, or issued tokens, further authenticate operators within sessions, with enforced via lists on the side. Key mechanisms include WS-SecureConversation for establishing and maintaining secure sessions, which derives session keys from initial channel keys to protect ongoing communications against key compromise. Application instance certificates ensure server and client identities are verifiable, while user tokens allow granular without exposing credentials. Audit events log security-relevant actions, such as attempts and violations, to support and forensic in industrial environments. In version 1.05, the security model introduces support for policies, such as Basic256Sha256_ECC and Basic256Sha256_ECC_X962, which use elliptic curves like secp256r1 for asymmetric operations, offering equivalent security to RSA-based policies with smaller key sizes and improved performance on resource-constrained devices. Features such as integration with Global Discovery Servers (GDS) for certificate lifecycle automation and (introduced in version 1.04) facilitate secure deployments in cloud environments by centralizing trust anchors and enabling dynamic key rotation without manual intervention. The model mitigates common threats in industrial settings through sequence numbers and timestamps in secure channels to prevent replay attacks, mutual certificate-based to thwart man-in-the-middle interceptions, and configurable limits on connection attempts coupled with quotas to counter denial-of-service attempts. These protections ensure robust operation even in distributed systems, with secure channels integrating over transports like to maintain end-to-end .

Data Modeling and Built-in Types

The in OPC UA serves as a hierarchical and networked model for representing and processes, consisting of interconnected nodes that encapsulate about real-world entities. Nodes are the basic building blocks, classified into nine standard NodeClasses, including the abstract Base NodeClass, , , , ObjectType, VariableType, ReferenceType, , and . The Base NodeClass serves as the foundation for all others and defines common attributes, though it cannot be directly instanced. Objects model components or systems and can contain child nodes such as or ; store values, which may represent properties or dynamic content; define executable functions associated with objects. Type nodes—ObjectType, VariableType, ReferenceType, and —act as blueprints for creating instances, ensuring consistency in structure and behavior across the model. References establish relationships between , with each specifying a from a source to a target and typed by a ReferenceType to convey semantic meaning, such as hierarchical containment (e.g., HasComponent) or aggregation (e.g., HasProperty). This network of references allows for flexible modeling, including trees, graphs, and cycles where appropriate. provide filtered subsets of the , enabling clients to browse specific perspectives, such as operational data only, without exposing the entire model; each defines which references are included or excluded for navigation. The Browse service can be used to query these views, retrieving attributes and forward/backward references to traverse the model. OPC UA's built-in types define the primitive and composite data elements used in Variables and structures, ensuring platform-independent representation. Simple types include for true/false values, and a range of integers such as SByte (8-bit signed), Int16 (16-bit signed), UInt32 (32-bit unsigned), and Int64 (64-bit signed), along with floating-point types like (32-bit IEEE) and (64-bit IEEE). Complex structures build on these, with Arrays supporting multi-dimensional sequences of any built-in type (e.g., a array of Doubles for matrices), Structures as ordered fields of mixed types (e.g., a timestamped with DateTime and ), and Unions allowing selection of one variant from defined options for variant payloads. Enumerations map named constants to integer values (e.g., a enum with values for "OK", "Warning", "Error" encoded as 0, 1, 2), providing readable discrete options. These built-in types support extension through custom DataTypes defined in the , where users create subtypes of existing types (e.g., inheriting from to add industry-specific fields like units) or new enumerations for application domains, all registered as DataType nodes with subtypes via HasSubtype references. The type acts as a universal container, encapsulating any built-in type, array, structure, or extension object, with up to 100 levels of nesting to handle deeply composed data without loss of type information. Nodesets formalize these models as XML files defining the standard and extended nodes for . The core Standard Nodeset version 1.05.06, released on October 31, 2025, specifies the foundational nodes in the OPC UA namespace (http://opcfoundation.org/UA/), including all built-in types, base ObjectTypes like BaseObject and BaseVariable, and essential references. As of October 2025, minor updates in version 1.05.06 include bug fixes and improved compliance testing. Companion specifications extend this base with domain-specific nodesets; for instance, the Device Integration () companion specification (OPC 10001-100) defines models for industrial devices, including the AnalogItemType for representing analog signals with attributes such as (a of type AnalogItemType), EngineeringUnits, ValuePrecision, and (Min/Max/EURange) to standardize sensor and actuator data across vendors. Semantic encoding in OPC UA relies on namespaces and identifiers to ensure unambiguous, machine-readable data exchange. NodeIds uniquely identify nodes using a structure of NamespaceIndex (a numeric reference to a URI-defined namespace), IdType (Numeric, String, Guid, or Opaque), and the Identifier itself, allowing global uniqueness even across multiple servers (e.g., i=85 for in the core namespace). Namespaces, listed in the server's NamespaceArray, use URIs like http://opcfoundation.org/[UA](/page/UA)/ for core types or vendor-specific ones (e.g., http:///MyTypes/) to avoid collisions, enabling clients to resolve and interpret identifiers consistently for . QualifiedNames similarly qualify BrowseNames with namespaces for human-readable yet unique labeling in the model.

Implementations and APIs

Programming Language Support

OPC Unified Architecture (OPC UA) provides robust support for development across multiple programming languages through standardized stacks and libraries, enabling the creation of interoperable clients and servers. These implementations adhere to the IEC 62541 , facilitating secure and efficient industrial communication. For .NET developers, the UA-.NETStandard library from the serves as the primary , targeting .NET Standard 2.0 for cross-platform compatibility across Windows, , macOS, , and . The latest release, version 1.05.377.21 as of November 14, 2025, includes asynchronous operations via AsyncNodeManagers in the server library, allowing non-blocking I/O for high-performance applications, and integrated certificate stores supporting both folder-based and OS-level stores with features like Global Discovery Server integration and server push capabilities. This is certified for compliance with OPC UA up to version 1.05 and is available via for seamless integration into .NET applications. In , the library offers a modern, open-source implementation of the OPC UA stack, with version 1.0.8 released on November 3, 2025 targeting specification 1.05. It provides high-performance channels, , and data structures for both client and , and extends support to mobile platforms including through Java compatibility, while integration is possible via cross-compilation tools like Gluon Mobile. The OPC Foundation's legacy Java SDK remains available but receives no further updates, positioning as the recommended choice for new projects due to its active maintenance and comprehensive feature set. Support extends to other languages, including C/C++ via Unified Automation's SDK, which consists of portable C++ libraries for building OPC UA clients and servers with services for connection management, session handling, and PubSub extensions. An open-source alternative is open62541, a C-based compliant with OPC UA 1.05, suitable for systems. In , the opcua package (version 0.98.13, released 2021) delivers a pure-Python client and server , autogenerated from XML specifications for near-complete protocol coverage and tested against diverse stacks, offering both low-level access to UA structures and high-level classes for simplified ; however, it is deprecated, and the successor asyncua (latest version as of September 5, 2025) is recommended for new projects. For , the node-opcua library (version 2.158.0) enables asynchronous OPC UA applications leveraging and , with modules for client, server, and types, particularly suited for web-based integrations through its and planned WebSocket transport support. Common API patterns in these libraries revolve around OPC UA service calls, which follow a request-response model for core operations. Connection establishment typically involves CreateSession to initiate a session and ActivateSession for , ensuring setup. Data access uses the Read service to retrieve node attributes by ID, returning values or status codes. For real-time monitoring, the Subscribe pattern employs CreateSubscription to define publishing intervals and CreateMonitoredItems to track specific s, with notifications delivered asynchronously. Error handling is standardized via status codes, such as 0x00 for success or 0x80130000 for BadNodeIdUnknown, allowing applications to manage faults like invalid sessions (BadSessionIdInvalid) or access denials (BadUserAccessDenied) uniformly across implementations.

Open-Source and Commercial Stacks

OPC Unified Architecture (OPC UA) implementations are available in both open-source and commercial forms, providing developers with flexible options for building client and server applications. Open-source stacks, maintained by industry consortia, offer reference implementations that ensure compliance with the standard and facilitate community-driven enhancements. The provides the UA-.NETStandard reference stack, a cross-platform library targeting .NET Standard, which supports core OPC UA functionalities such as client-server communication, PubSub messaging, and security features. Its latest release, version 1.05.377.21, was issued on November 14, 2025, via , including updates for improved serialization and data model handling. Another prominent open-source option is Eclipse Milo's implementation for , a high-performance stack compliant with OPC UA 1.05, featuring modules for stack operations, client SDK, and server SDK. The most recent version, 1.0.8, was released on November 3, 2025, with enhancements for attribute support and code generation aligned to the latest specification. Commercial stacks extend these foundations with proprietary optimizations, comprehensive support, and tools tailored for deployments. Prosys OPC offers the tool, version 5.2.0 released on October 8, 2025, which serves as a versatile client for browsing, monitoring, and simulating servers, including support for data history and events. Unified Automation's C++ Based Client/Server SDK, updated to version 2.0.1 on August 29, 2025, provides a modular for and high-performance applications, with separate bundles for , client, and PubSub capabilities. Softing's .NET Standard SDK, version 3.90.0 from July 23, 2025, builds on the OPC Foundation's to enable seamless of into .NET applications, supporting both client and roles with packaging for easy deployment. Key features across these stacks emphasize certification , performance tuning, and ancillary tooling to ensure robust . All referenced implementations undergo certification testing, which validates adherence to profiles for , robustness, and efficiency, as outlined in the compliance guidelines. Performance optimizations include real-time support in stacks like Unified Automation's High Performance SDK, which employs a single-threaded asynchronous to prevent blocking in deterministic environments. Tooling such as simulators is integral; for instance, Prosys OPC UA Simulation Server (version 5.6.0, October 8, 2025) allows simulation and historical playback for testing, while open-source options like MatrikonOPC Simulation Server provide DA, HDA, and A&E emulation. These stacks contribute significantly to the OPC UA ecosystem through nodeset extensions and interoperability enhancements. Open-source efforts, such as those from the and , include companion nodesets for standard information models, promoting standardized data modeling across devices. Commercial vendors like Softing and Unified Automation provide interoperability plugins that facilitate seamless connections with systems; for example, Softing's SDK integrates with Kepware for device-level data bridging, while Unified Automation supports Ignition's OPC UA module for edge-to-cloud data flow.
StackTypeLatest Version (2025)Key FeaturesCertification
UA-.NETStandardOpen-Source (.NET)1.05.377.21 (Nov)Cross-platform client/server, PubSubOPC Foundation Compliant
Eclipse MiloOpen-Source (Java)1.0.8 (Nov)High-performance stack, SDK modulesOPC UA 1.05 Compliant
Prosys OPC UA BrowserCommercial Tool5.2.0 (Oct)Browsing, simulation, event monitoringProfile Validated
Unified Automation C++ SDKCommercial (C++)2.0.1 (Aug)Embedded support, asynchronous APIOPC Foundation Certified
Softing .NET SDKCommercial (.NET)3.90.0 (Jul)NuGet integration, client/serverStack-Based Compliant

Applications and Adoption

Industrial Use Cases

In manufacturing environments, OPC UA facilitates seamless integration of programmable logic controllers (PLCs), human-machine interfaces (HMIs), and manufacturing execution systems (MES) through the Device Integration (DI) companion specification, which standardizes device descriptions and enables consistent data exchange across heterogeneous equipment. This approach supports real-time monitoring and control, reducing silos between shop-floor devices and higher-level systems. For instance, in automotive assembly lines, companies like Renault have deployed OPC UA across over 3,300 pieces of production equipment spanning 38 lines in 16 countries, allowing adaptive production adjustments based on real-time data from sensors and RFID systems to optimize workflows and minimize downtime. In process industries such as oil and gas, OPC UA enables comprehensive monitoring by supporting aggregates for historical data access, as defined in Part 11 of the specification, which allows clients to query processed values like averages or minima over time intervals for and . This capability integrates with safety instrumented systems () via the OPC UA Safety specification (Part 15), ensuring certified communication up to SIL 3 levels while exchanging safety-related data securely between controllers and monitoring applications. Within the energy sector, OPC UA underpins communications by harmonizing data models from standards like and the Common Information Model (CIM), enabling interoperable exchange of status, load balancing, and event notifications across substations and utilities. In operations, it aggregates turbine data—such as , power output, and fault diagnostics—from supervisory control and data acquisition (SCADA) systems, facilitating centralized monitoring and remote control to enhance reliability and energy yield. By November 2025, over 1,000 OPC UA products and stacks have achieved certification from the , reflecting widespread adoption in Industry 4.0 initiatives by major vendors including and , whose controllers natively support OPC UA for from field devices to enterprise systems.

Integration with Emerging Technologies

OPC Unified Architecture (OPC UA) facilitates integration with (IIoT) environments through its Publish-Subscribe (PubSub) extension, which supports messaging protocols like and AMQP for efficient, scalable data exchange in distributed systems. PubSub over enables lightweight, broker-based communication suitable for IIoT scenarios, allowing OPC UA data to be bridged to or infrastructures while preserving semantic modeling. In , OPC UA deployments on gateways address low-latency requirements by processing data locally and supporting real-time control, as demonstrated in architectures combining OPC UA with for interoperable IIoT networks. For instance, integrations like those with Kepware in 2025 enable OPC UA data to be exposed via APIs, facilitating seamless connectivity to web-based IIoT applications without compromising . In cloud deployments, OPC UA leverages tools such as the OPC Publisher module on to bridge industrial assets to , enabling secure ingestion of OPC UA data into for analytics and storage. Similarly, AWS IoT SiteWise supports OPC UA data sources through edge gateways and collectors in AWS IoT Greengrass, allowing direct integration of OPC UA servers for industrial data streaming to the . Secure data tunneling enhances these integrations by encapsulating OPC UA traffic over encrypted channels, bypassing restrictions and ensuring compliance with security policies like in cloud-to- scenarios. For AI and machine learning applications, OPC UA's semantic information models provide structured data representations that support predictive maintenance by enabling contextual analysis of equipment states. These models facilitate data feeds from OPC UA nodesets to frameworks like and , where historical and real-time industrial data can be processed for anomaly detection and optimization models. Recent developments in OPC UA version 1.05 include extensions for encoding, which standardize the serialization of OPC UA data types for with and services, as defined in the specification's mappings to JSON Schema. This enhances PubSub capabilities, supporting hybrid client-server and PubSub patterns for scalable in post-2023 industrial pilots, where combined models improve data distribution efficiency in mixed environments.

Future Developments

Roadmap and Innovations

The OPC Foundation's roadmap for OPC Unified Architecture (OPC UA) delineates enhancements across three timelines: recent developments, ongoing initiatives, and future visions, as outlined in their official documentation. Recent advancements include the 2023 release of OPC UA Field eXchange (UAFX) version 1.0, which supports controller-to-controller communication via Publish-Subscribe (PubSub) mechanisms and offline configuration for field-level deployments. In 2023, Device Onboarding was introduced to streamline security configurations throughout the device lifecycle, while 2022 saw the addition of the Cloud Library for enriched metadata in cloud-published data and version 5 enhancements for improved routing and filtering. These build on earlier 2020 features like (ECC) security policies and Alias Names for simplified node addressing. Current efforts focus on harmonizing companion standards since 2019 to minimize overlaps, alongside the Cloud Initiative for edge-to-cloud architectures, collaborations like the March 2025 initiative with the International Data Spaces Association to connect OPC UA assets to data spaces for secure data exchange, and an Initiative integrating OPC UA models with in . Key priorities include AI-ready semantics, enabling seamless data feeding to AI models through flexible, standardized information models that enhance and accelerate AI deployment in industrial settings. Progress also encompasses quantum-safe research, with hybrid approaches proposed to integrate post-quantum primitives like digital signatures and key establishment into OPC UA's security handshake, addressing threats from to public-key standards. Future directions emphasize enhanced PubSub mappings to 5G, Time-Sensitive Networking (TSN), WiFi 6/7, and IETF Deterministic Networking (DetNet) for low-latency, deterministic communication in industrial environments. Planned innovations include transaction support for complex configurations, cloud-relay mechanisms for firewall traversal, and expanded companion specifications, such as the draft VDMA 40700 for surface technology general types, issued in April 2025 to standardize data exchange in cleaning, coating, and related processes, currently under public review. Blockchain integration is explored for enhancing trust in supply chains through federated models that leverage OPC UA for secure, interoperable data sharing among participants. Research areas underscore formal security analysis, exemplified by a 2025 IACR paper providing a comprehensive verification of OPC UA Binary specification sub-protocols using ProVerif models to identify vulnerabilities in authentication and encryption. Safety extensions via the OPC UA Safety Specification, published in November 2021 and supporting up to Safety Integrity Level 4 (SIL 4) through a black-channel approach, continue to evolve for functional safety in hazardous environments. Challenges center on achieving zero-trust architectures amid operational technology (OT) and information technology (IT) convergence, requiring robust and continuous verification to mitigate risks in interconnected systems. Goals include accelerating global certification growth, with mandatory profiles for and facets to ensure compliance and interoperability across diverse ecosystems.

References

  1. [1]
    Unified Architecture - Landingpage - OPC Foundation
    The OPC Unified Architecture (UA), released in 2008, is a platform independent service-oriented architecture that integrates all the functionality of the ...OPC UA Roadmap · Resources · UA Companion Specifications
  2. [2]
    [PDF] OPC Unified Architecture
    OPC Unified Architecture (OPC UA) is the informa- tion exchange standard for secure, reliable, manu- facturer- and platform-independent industrial com-.
  3. [3]
    [PDF] OPC UA for Analyzer Devices (ADI) is released as a companion ...
    The OPC Foundation begins converting its existing specification to web services. 1999. Classic OPC Alarms & Events (OPC AE) specification is released. 2001.
  4. [4]
  5. [5]
    Ten Reasons for OPC UA - Automation.com
    1. Discontinuation of COM/DCOM · 2. DCOM limitations · 3. OPC communication across firewalls · 4. Use of OPC on non-Windows platforms · 5. High-performance OPC ...Missing: motivations | Show results with:motivations
  6. [6]
    OPC UA Deep Dive (Part 1): History of the OPC UA Protocol | Claroty
    Apr 12, 2023 · The original OPC Classic protocols had nothing in common. Each of the protocols—DA, AE, HDA, XML DA, and DX—have their own commands that apply ...
  7. [7]
    Process Automation OPC: OPC UA – Up and Running | Control Global
    The official release of the OPC UA specifications in June 2006 was the unveiling of the Release Candidate versions of the first five of twelve specification ...Missing: project | Show results with:project
  8. [8]
    OPC UA Online Reference - Released ... - OPC Foundation
    OPC 10000-11: UA Part 11: Historical Access. 1.05.04. 2024-11-29. 1.04. 2018-01-09. OPC 10000-12: UA Part 12: Discovery and Global Services. 1.05.06. 2025-10-31.OPC 10000-3 UA Part 3 · OPC 10000-4 UA Part 4 · UA Part 23 · 1.05.06
  9. [9]
    UA Companion Specifications - OPC Foundation
    Companion specifications of such Information Models are often called “Industry standard models” because they typically address a dedicated industry problem. The ...
  10. [10]
    Unified Architecture - OPC Foundation
    ### Core OPC UA Specifications
  11. [11]
    OPCFoundation/UA-Nodeset - GitHub
    This repository contains UANodeSets and other normative files which are released with a specification. Any change to a specification (release of a new ...Missing: freely | Show results with:freely
  12. [12]
    IEC TR 62541-1:2010
    IEC/TR 62541-1:2010(E) presents the concepts and overview of the Unified Architecture (OPC UA) specification produced by the OPC Foundation.
  13. [13]
    IEC 62541-4:2011
    IEC 62541-4:2011 defines the OPC Unified Architecture (OPC UA) Services. The Services described are the collection of abstract Remote Procedure Calls (RPC) ...
  14. [14]
    Update for IEC 62541 (OPC UA) Published
    Apr 22, 2015 · An updated and enhanced edition of the IEC 62541 standard, which represents the international standard of OPC UA, was published in March by the IEC standards ...
  15. [15]
    IEC TR 62541-2:2020
    Nov 17, 2020 · IEC 62541-2:2020 describes the OPC Unified Architecture (OPC UA) security model. It describes the security threats of the physical, hardware ...
  16. [16]
    IEC 62541-10:2015
    IEC 62541-10:2015 is part of the overall OPC Unified Architecture (OPC UA) standard series and defines the information model associated with Programs.
  17. [17]
    IEC 62541-14:2020
    Jul 8, 2020 · IEC 62541-14:2020 defines the OPC Unified Architecture (OPC UA) PubSub communication model. It defines an OPC UA publish subscribe pattern.
  18. [18]
    Overview & Benefits - OPC Foundation
    The OPC Foundation's Certification and Compliance program exists to help members develop and deliver high quality products that meet minimum operability ...Missing: IEC 62541
  19. [19]
    How to Certify - OPC Foundation
    The OPC Foundation Certification Program requires OPC-based products to pass an extensive level of testing to assure compliance, interoperability, robustness, ...Missing: IEC 62541
  20. [20]
    [PDF] The Interoperability Standard for Industrial Automation
    Aug 23, 2017 · What is shown in Figure 1. is the timeline for the delivery of a set of specifications which are also published through IEC 62541. Figure 1 ...
  21. [21]
  22. [22]
  23. [23]
    UA Part 14: PubSub - OPC UA Online Reference
    This document defines nodes in the following nodesets: http://opcfoundation.org/UA/ · 1 Scope 2 Normative references 3 Terms, definitions and abbreviated terms ...
  24. [24]
    Profile PubSub MQTT UADP
    This PubSub transport Facet defines a combination of the MQTT transport protocol mapping with UADP message mapping. This Facet is used for broker-based ...
  25. [25]
    [PDF] The OPC UA Security Model For Administrators Whitepaper Version ...
    Jul 7, 2010 · This white paper describes how to use the OPC UA security model to ensure application and transport security. The target audience for this ...
  26. [26]
    UA Part 2: Security - 5 Security reconciliation
    ### Summary of Elliptic Curve Cryptography (ECC) Policies in OPC UA 1.05
  27. [27]
    UA Part 2: Security - 6 Implementation and deployment considerations
    ### Summary of Key Management Enhancements for Cloud Deployments in OPC UA Security
  28. [28]
    [PDF] Practical Security Recommendations for building OPC UA Applications
    The group focuses on the communication standard OPC UA. In this proceeding second version of the document “Practical Security Recommendations for building OPC ...
  29. [29]
  30. [30]
    UA Part 3: Address Space Model - 4 AddressSpace concepts
    ### Summary of Address Space Model in OPC UA (OPC 10000-3 UA Part 3: Address Space Model, version 1.05.05)
  31. [31]
  32. [32]
    UA Part 6: Mappings - 5.1 General
    All OPC UA DataEncodings are based on rules that are defined for a standard set of built-in types. These built-in types are then used to construct structures, ...
  33. [33]
    UA Part 3: Address Space Model - 5.8 DataTypes
    Enumeration DataTypes are DataTypes that represent discrete sets of named values. Enumerations are always encoded as Int32 on the wire as defined in OPC 10000-6 ...
  34. [34]
    UA Part 3: Address Space Model - 8 Standard DataTypes
    ### Summary: Semantic Encoding Using Namespaces and Identifiers for Machine-Readable Data Exchange
  35. [35]
    OPCFoundation/UA-.NETStandard: OPC Unified Architecture .NET ...
    Official OPC UA .NET Standard Stack from the OPC Foundation. Overview. This OPC UA reference implementation is targeting the .NET Standard specification. .NET ...Releases 88 · Issues 107 · Pull requests 8 · Security
  36. [36]
  37. [37]
    Eclipse Milo 1.0.0 | projects.eclipse.org
    May 19, 2025 · Eclipse Milo has reached version 1.0.0, with an implementation targeting OPC UA 1.05. The API is stable, documentation (some) exists, ...
  38. [38]
    C++ Based OPC UA Client & Server SDK (Bundle)
    The UA SDK is a C++ library that supports you in writing portable C++ OPC UA Servers. The UA SDK actually consists of two SDKs, a Server SDK and a Client SDK.
  39. [39]
    opcua - PyPI
    opcua 0.98.13 · Project description · Project details · Release history Release notifications | RSS feed · Download files · File details · Help · About PyPI.
  40. [40]
    FreeOpcUa/python-opcua: LGPL Pure Python OPC-UA Client and ...
    OPC UA binary protocol implementation is quasi complete and has been tested against many different OPC UA stacks. API offers both a low level interface to send ...
  41. [41]
    node-opcua-server - NPM
    Sep 26, 2025 · pure nodejs OPCUA SDK - module server. Latest version: 2.157.0, last published: a month ago. Start using node-opcua-server in your project ...
  42. [42]
  43. [43]
  44. [44]
  45. [45]
    Releases · OPCFoundation/UA-.NETStandard - GitHub
    Sep 18, 2025 · 1.05.376 June Release. It contains important bug fixes which were found after the last 1.05.376 release, as well as a couple of new features.
  46. [46]
    Releases · eclipse-milo/milo - GitHub
    What's Changed. Add new attributes defined by OPC 1.04 by @kevinherron in #958; Generate new stack and SDK code for OPC UA 1.05 by @kevinherron ...
  47. [47]
    OPC UA Stack - org.eclipse.milo - Maven Repository
    Version ▽, Vulnerabilities, Repository, Usages · Date. 0.6.x. 0.6.16 · Central. 0. Apr 22, 2025. 0.6.15 · Central. 0. Dec 04, 2024. 0.6.14 · Central. 0. Aug 01, ...
  48. [48]
    Browser 5.2.0, Monitor 1.7.4, and Simulation Server 5.6.0 Released
    Prosys OPC UA Browser 5.2.0, Monitor 1.7.4, and Simulation Server 5.6.0 Released. October 8, 2025. We have released new updates for three of our OPC UA ...
  49. [49]
    New C++ based OPC UA Client/Server + Pub/Sub SDK V2.0.1
    New C++ based OPC UA Client/Server + Pub/Sub SDK V2.0.1 - Service Release. 08/29/2025 Products. A new Service Release of the C++ ...
  50. [50]
    [PDF] OPC UA .NET Standard SDK Release Notes July 2025
    Jul 23, 2025 · V3.90.0 23.07.2025. Integrates the new version of OPC UA .NET Standard Stack from OPC Foundation. (NuGet package OPCFoundation.NetStandard.Missing: open- source
  51. [51]
    1.2.4 OPC Compliance & Certification
    Certification - Validation of Server or Client products. Certification includes compliance, interoperability, robustness, efficiency and usability testing and ...Missing: stacks features
  52. [52]
    High Performance OPC UA Server SDK - Unified Automation
    The single thread / single task architecture allows for running the SDK in parallel to real time task. The fully asynchrounous API can not block and guarantees ...
  53. [53]
    Simulate OPC Data with the free MatrikonOPC Simulation Server
    OPC Simulation Server is a free utility that provides simulated OPC DA, OPC HDA, and OPC A&E data for the purposes of testing OPC Clients.Missing: commercial | Show results with:commercial
  54. [54]
    Introduction — open62541 (1.4.11) 1.4.11 documentation
    Furthermore, the OPC Foundation organizes events for the dissemination of the standard and provides the infrastructure and tools for compliance certification.<|separator|>
  55. [55]
    OPC UA Clients, Server, Subscriber & Publisher Integration in C# ...
    OPC UA .NET Standard SDK enables fast integration of OPC UA communication into .NET Standard applications. Thanks to the .NET Standard library, you are not ...
  56. [56]
    Connecting to Kepware OPC UA - Ignition User Manual
    May 23, 2024 · Create a new OPC connection, enter the server endpoint, trust the Ignition client on the Kepware server, and trust the connection in Ignition.Missing: ecosystem nodesets interoperability
  57. [57]
    OPC-UA Protocol Cyber Threats: an In-Depth Analysis
    Mar 29, 2023 · By 2021, Renault had installed more than 3,300 production line equipment supporting the OPC-UA protocol across 38 production lines in 16 ...Missing: assembly | Show results with:assembly
  58. [58]
    [PDF] Standardized Smart Grid Semantics using OPC UA for Communication
    OPC UA harmonizes data models like Common Information Model and IEC 61850, using a server-client architecture to improve interoperability in smart grids.Missing: wind aggregation
  59. [59]
    Wind Farm - Cisco
    Feb 4, 2025 · § Turbine telemetry data (SCADA) translation to OPC-UA. § Provide turbine monitor and operational data to wind farm operator using OPC-UA.
  60. [60]
    Find Products - OPC Foundation
    Weintek's OPC UA server on cMT/cMT X Series including cMT3000X HMIs, cMT-SVRX Headless HMIs, and cMT Gateways are certified by the OPC Foundation. Our IIoT ...
  61. [61]
    OPC UA - Siemens Global
    OPC UA prepares your network for digitization - open and platform-neutral and in combination with PROFINET in a shared industrial ethernet network.
  62. [62]
    OPC UA - Rockwell Automation
    Projects · Version control · Communication driver · OPC UA · Graphic and layout objects · Libraries · Manage project content · Trends.
  63. [63]
    OPC UA + MQTT = A Popular Combination for IoT Expansion
    ... OPC UA and communications protocols such as MQTT. According to the OPC Foundation, “PubSub enables the use of OPC UA directly over the Internet by utilizing ...
  64. [64]
    UA Part 14: PubSub - 7.3.4 AMQP
    This specification defines two possible message mappings for the AMQP message body, the UADP message mapping defined in 7.2.2 and a JSON message mapping defined ...Missing: MQTT | Show results with:MQTT
  65. [65]
    Bridging OPC UA Data to MQTT for IIoT: A Step-by-Step Tutorial
    Aug 10, 2023 · The OPC UA protocol enables communication and data exchange between devices, while MQTT provides an efficient, flexible and secure messaging mechanism.
  66. [66]
    Design for Low Latency and High Reliability: OPC-UA Based ...
    The designed OPC-UA is deployed at the edge gateway to effectively solve the data heterogeneity, support centralized control of network resources, and ...
  67. [67]
    An interoperable and flat Industrial Internet of Things architecture for ...
    In this work, we propose an interoperable and flat IIoT architecture, combining OPC UA and SDN technologies to meet high interoperability and low latency ...
  68. [68]
    OPC UA to REST API: Kepware & Ignition Integration Guide 2025
    Oct 8, 2025 · Learn how to integrate industrial data using modern web applications through OPC UA and REST API with effective security and performance ...
  69. [69]
    Microsoft OPC Publisher | Industrial-IoT - Azure documentation
    OPC Publisher is a module that runs on Azure IoT Edge and bridges the gap between industrial assets and the Microsoft Azure cloud. It connects to OPC UA server ...Missing: AWS | Show results with:AWS
  70. [70]
    OPC UA data sources for AWS IoT SiteWise Edge gateways
    Learn how to configure data sources so your SiteWise Edge gateway can ingest data from industrial equipment to AWS IoT SiteWise.
  71. [71]
    IoT SiteWise OPC UA collector - AWS Documentation
    The IoT SiteWise OPC-UA collector component ( aws.iot.SiteWiseEdgeCollectorOpcua ) enables AWS IoT SiteWise gateways to collect data from local OPC-UA servers.Requirements · Dependencies · Input data · Local log file
  72. [72]
    Making the Most of Secure OPC UA Data Access
    Secure OPC UA access involves application security, securing gateways, and secure data tunneling, complementing native OPC UA security.
  73. [73]
    What is OPC Unified Architecture (OPC UA)? - PTC
    History of OPC UA​​ First iterations of the OPC standard were restricted to Windows operating systems, and thus the acronym OPC was derived from “OLE (object ...
  74. [74]
    Semantic Framework for IT-OT Integration in Industrial Environments
    Oct 26, 2025 · This semantic approach significantly improves fault diagnostics, predictive maintenance, and anomaly detection by preserving contextual ...
  75. [75]
    [PDF] Machine learning framework for OPC UA data (Industry 4.0) - Aaltodoc
    Apr 1, 2019 · Machine learning algorithms can spot patterns from complex datasets and in some cases create models that are more effec- tive than ones ...Missing: nodesets | Show results with:nodesets
  76. [76]
    Feeding OPC UA data to AI models
    ... predictive maintenance, anomaly detection, and real-time optimization. SIOTH® with OPC UA data helps bridge the gap between operational data and AI systems ...Missing: PyTorch | Show results with:PyTorch
  77. [77]
    UA Part 6: Mappings - Annex G (normative)Mapping to JSON Schema
    The UA JSON DataEncoding defined in 5.4 specifies how OPC UA DataTypes are serialized in JSON. This Annex specifies how to describe the DataEncoding using a ...
  78. [78]
    OPC UA Integration with JSON Data Formats
    We want to look at the JSON format for data, which the OPC UA part 6 specifies as a data encoding that can be used for OPC UA data types and can be used in OPC ...
  79. [79]
    [PDF] News on OPC UA platform, PubSub and MQTT
    OPC UA PubSub JSON Header Layout (1.05.03). ▻. PubSub message mappings have flexible configuration options for different use cases. ▻. Header Layouts define ...
  80. [80]
    OPC UA Roadmap
    The OPC UA road map highlights recent and future enhancements to the OPC UA standard. It provides a hint for next steps and the general vision. In our road maps ...<|control11|><|separator|>
  81. [81]
    [PDF] Integrating PQC into Industrial M2M Communication
    Nov 29, 2021 · Having analyzed OPC UA's conventional security handshake, we turn to our first quantum-resistant solution: Hybrid OPC UA. Our ProVerif model ...
  82. [82]
    [PDF] OPC UA for Surface Technology - General Types - VDMA
    Jun 1, 2025 · The definitions for the Attributes can be found in OPC 10000-3. Table 11 – Common Method Attributes. Attributes. Value. Executable. All Methods ...
  83. [83]
    [PDF] Federated Blockchained Supply Chain Management - Hal-Inria
    IEC 62541 is the standardization of. OPC UA which is an industrial M2M communication protocol for full interoperability. Its goal is to provide a Service- ...<|separator|>
  84. [84]
    [PDF] A Comprehensive Formal Security Analysis of OPC UA
    Jan 31, 2025 · The ECC family offers an Elliptic Curve Diffie–Hellman (ECDH) key exchange that can additionally provide PFS. Session creation and activation.
  85. [85]
    Safety - OPC Foundation
    November 2021: Publication of OPC UA Safety Specification Release 1.05. Key Features, Material, Contact.