ES
OPC UA: The Standard for Industrial Communication and Interoperability

OPC UA: The Standard for Industrial Communication and Interoperability

A technical guide to OPC UA (Unified Architecture) covering its architecture, security model, information modeling, and role in Industry 4.0 and IIoT integration.

Published on March 1, 2025

What Is OPC UA?

OPC UA (OPC Unified Architecture) is a platform‑independent, service‑oriented architecture (SOA) standard for secure, reliable data exchange across industrial automation layers. Adopted as the international standard IEC 62541, OPC UA defines an information‑centric framework that moves beyond simple tag polling to a semantic, object‑oriented address space suitable for field devices, PLCs, SCADA, MES, ERP and cloud systems. According to the OPC Foundation, OPC UA serves as the key interoperability protocol for Industry 4.0 and the Industrial Internet of Things (IIoT), enabling deterministic and non‑deterministic communications across enterprise, management, operations, control and field levels (OPC Foundation / IEC 62541).

OPC UA replaces limitations of OPC Classic by offering:

  • Platform and language independence (runs on Windows, Linux, RTOS and embedded systems).
  • Rich information modeling with standardized semantics and metadata for each node.
  • Multiple transport mappings (Binary TCP, HTTPS, MQTT, AMQP, WebSockets, UDP/QUIC, TSN).
  • Built‑in security based on PKI and X.509 certificates with message signing/encryption.

OPC UA Architecture

The OPC UA architecture combines client‑server and publisher‑subscriber (pub/sub) communication paradigms to serve a wide spectrum of industrial use cases. Servers expose an address space — a hierarchical namespace of nodes representing variables, objects, methods, types and events — and clients browse, read, write, call methods and subscribe to monitored items. For scalable IIoT and cloud scenarios, OPC UA includes a pub/sub extension that decouples publishers and subscribers and supports transports such as MQTT, AMQP and UDP multicast for efficient one‑to‑many delivery.

Key architectural facts and transport details:

  • Address space: Information‑centric, object‑oriented, supports type inheritance, references and multiple data types documented in OPC 10000‑3 (Address Space Model) (OPC Foundation).
  • Service sets: Data Access, Historical Access, Alarms & Conditions, Aggregates, and Pub/Sub are core capabilities defined in IEC 62541 parts 5 and above.
  • Transport mappings: Native binary TCP (default) typically uses port 4840, SOAP/HTTPS for web services, MQTT/AMQP for cloud brokers, WebSockets for browser access, and UDP/TSN for real‑time multicast (PTC IIoT overview).
  • Layering: OPC UA can carry data from the field level (sensors/actuators) up to enterprise systems without forcing strict hierarchy; implementations commonly operate across five levels—enterprise, management, operations, control and field—to facilitate full‑meshed topologies (KEBA overview).

Client‑Server and Pub/Sub Models

OPC UA client‑server provides request/response services (read, write, call, browse), whereas the pub/sub model implements event and telemetry streaming. Pub/sub supports different Quality of Service (QoS) and transport bindings: MQTT/AMQP for brokered cloud delivery and UDP multicast/TSN for low‑latency local deterministic distribution as defined in OPC UA Pub/Sub specifications (OPC Foundation specs).

Security Model

OPC UA defines security as an integral part of its architecture — "secure by design." The security model mandates application authentication, message integrity, confidentiality, user authentication and access control, and auditing. It leverages established cryptographic standards and public key infrastructure (PKI) using X.509 certificates.

Implemented security mechanisms include:

  • Application authentication using X.509 v3 certificates validated by PKI. Applications exchange and validate certificates during secure channel setup (OPC 10000‑2 Security Model).
  • Message security with signing and encryption. OPC UA profiles support algorithms such as RSA for key exchange and AES (e.g., AES‑256) for symmetric encryption, with SHA‑2 family for hashing depending on policy selection.
  • User authentication via username/password, certificate‑based user identity, Kerberos or token‑based methods depending on deployment.
  • Access control and roles enforced at the server side with Role‑Based Access Control (RBAC) and fine‑grained user rights for nodes, methods and events.
  • Secure channels and sessions which segregate transport security from individual user sessions and provide anti‑replay and sequence protection.

Security policies range from None (for lab testing) to high‑security profiles such as Basic256Sha256 and equivalent modern profiles complying with IEC 62541‑2. Best practices recommend full PKI deployment with certificate lifecycle management and explicit firewall rules that rely on a single, firewall‑friendly TCP port (default 4840) for client‑server traffic (OPC Foundation).

Information Modeling

OPC UA’s information modeling is a core differentiator. Instead of exchanging unnamed tags, systems exchange nodes with defined metadata, types, units, engineering limits and semantic references. This approach supports machine‑readable models, enabling meaningful data interpretation across vendors and systems.

Companion Specifications standardize domain models. Examples include:

  • PackML (Packaged Machine Language) for packaging machines — defines machine states, phases and performance metrics (OEE) to harmonize factory reporting (PTC summary).
  • Euromap (e.g., Euromap 77) for plastics injection molding data exchange.
  • DEXPI (Data Exchange in Process Industry) for process engineering diagrams and semantic data models.
  • ISA‑95 mapping for manufacturing operations management integration with MES and ERP.

The OPC Foundation maintains Industrial Automation Nodesets and a growing catalog of companion specifications that provide normative node sets and types to guarantee consistent semantics between a robot from ABB and a PLC from Siemens (Industrial Automation Nodesets).

OPC UA in Practice

OPC UA has broad vendor adoption across controllers, HMIs, gateways, and cloud connectors. Manufacturers ship controllers and devices with built‑in OPC UA servers or client libraries to simplify IT/OT integration. The technology supports use cases from high‑speed inspection and packaging to plantwide analytics and cloud historian ingestion.

Representative product implementations and roles (current as of 2026):

Product / Manufacturer OPC UA Role Key Compatibility & Notes
Omron NX/NJ Series Server (standard) IEC 61131‑3 PLC integration, high‑speed analog support, SCADA/MES/SQL ingestion (see Omron Sysmac docs)
Siemens SIMATIC ET 200 / S7‑1500 Server / Full network Object‑oriented models via TIA Portal, integrated OPC UA server on S7‑1500, supports namespaces and type modeling (Siemens TIA Portal docs)
Beckhoff TwinCAT Server / Pub/Sub Integrated OPC UA with information modeling and pub/sub; used for machine data and servo diagnostics
SENECA Gateways / RTUs Client / Server Parameterization and diagnostics for IoT edge integration and Industry 4.0 applications (SENECA blog)
Cloud connectors (AWS IoT SiteWise, Azure IoT Hub) Client / Gateway Edge gateways map OPC UA nodes to cloud models and ingest telemetry via MQTT/AMQP

OPC UA over TSN and Real‑Time Trends

For deterministic, real‑time communications at the field level, the industry converges on OPC UA over Time‑Sensitive Networking (TSN). TSN extends Ethernet with time synchronization and scheduling, enabling sub‑millisecond latencies for motion control and robotics when combined with OPC UA Pub/Sub. B&R, Siemens and other automation vendors publish guidance and white papers for OPC UA + TSN deployments (B&R TSN white paper).

Standards and Compliance

OPC UA is specified across multiple IEC documents. Important standards and relationships include:

  • IEC 62541 (OPC UA) — Parts 1–14+ specify overview, security, address space, services, information modeling, mappings and Pub/Sub. These parts are the definitive normative references for implementation (OPC Foundation / IEC 62541).
  • IEC 61131‑3 — PLC programming standard; many OPC UA implementations expose IEC 61131‑3 variables and structures to higher layers such as MES and SCADA (Omron Sysmac OPC UA docs).
  • RAMI 4.0 — The Reference Architecture Model for Industry 4.0 recommends OPC UA for cross‑layer interoperability.
  • IEEE 802.1 TSN — Defines deterministic Ethernet features used with OPC UA Pub/Sub for real‑time networking.

Implementation Best Practices

Successful OPC UA deployments follow engineering and security best practices. Key recommendations include:

  • Use Binary TCP on port 4840 for high‑performance client‑server traffic and simplified firewall configuration; reserve additional ports only for non‑standard mappings (OPC Foundation).
  • Deploy PKI and X.509 certificates for application and user authentication; automate certificate issuance and renewal where possible to prevent expired certificates from interrupting operations (OPC 10000‑2).
  • Model semantically — use companion specifications and standardized Nodesets (PackML, Euromap, ISA‑95) rather than freeform tags to enable cross‑vendor analytics and asset management (Industrial Automation Nodesets).
  • Mix client‑server and pub/sub — use client‑server for configuration, control and on‑demand requests; use pub/sub (MQTT/AMQP) for high‑volume telemetry to cloud or UDP/TSN for deterministic local multicast.
  • Validate cross‑vendor interoperability — test combinations such as Omron PLC → SCADA or Siemens ET 200 → MES during FAT/SAT and use interoperability test tools provided by the OPC Foundation.
  • Audit and logging — enable secure logging, session auditing and change control to meet compliance and traceability requirements in regulated industries (pharma, food, automotive).

Technical Comparison: OPC UA Key Capabilities

Capability OPC UA Feature / Specification Practical Impact
Transport Protocols Binary TCP (default, port 4840), SOAP/HTTPS, MQTT, AMQP, WebSockets, UDP/QUIC, TSN Flexible deployment from embedded devices to cloud; single TCP port simplifies firewall rules
Security PKI, X.509 certificates, message signing/encryption (RSA/AES/SHA), role‑based access End‑to‑end confidentiality, integrity and strong authentication suitable for industrial security policies
Data Modeling Address Space Model, Node types, Companion Specifications, Nodesets Machine‑readable semantics enable cross‑vendor analytics and standardized MES

Related Platforms

Related Services

Frequently Asked Questions

Need Engineering Support?

Our team is ready to help with your automation and engineering challenges.

sales@patrion.net