On this page
Latest Manual Constraint File | SFT Constraint Assessments |
About Security Constraints | SFT Calculation Methodology |
Procedures for Managing Security Constraints |
SPD will normally dispatch the lowest-cost generation to meet demand (allowing for co-optimisation of energy and reserves).
About Security Constraints
When unconstrained dispatch does not allow the System Operator's security policies to be met (for example, if transmission assets are expected to be operated beyond rated short-term capability after any defined contingent event) then a security constraint is applied in SPD.
Security constraints may be applied as:
- a temporary constraint – to deal with an outage situation when some assets are not available
- a permanent constraint – when the normal integrated power system capability and expected generation offers and demand may not result in secure operation.
![]() |
In 2011, we implemented the Simultaneous Feasibility Test (SFT) software which automatically creates security constraints that are applied to SPD, these are published through schedules in WITS.
In addition to the automatically created constraints created by the SFT software the spreadsheet below has constraints that the System Operator develops using non-automated processes (manual constraints). This list will be updated as and when the constraints in the list are revised.
Where practicable this information will be published two weeks prior to the date the constraints are intended to be first used. Note this may not always be possible where manual constraints have been identified as being required due to the automatic scheduling process not being able to mitigate a security issue which runs one week out.
![]() |
SFT Constraint Assessments
Participants may request an SFT constraint assessment to be performed and posted to the industry via POCP or the System Operator website. The purpose of such assessments is to provide an indication of what the limiting security constraints may be during a particular outage or grid configuration. To request a SFT constraint assessment email: OPS.Planner@transpower.co.nz.
A set of generation scenarios to be used for SFT constraint assessments has been agreed by the constraint information working group; this is a living document and will be updated based on experience. The aim of the list is to ensure scenarios which will identify unique constraints are studied, while keeping scenarios to a minimum so that studies are performed efficiently and turn around for requests is as quick as possible.
![]() |
SFT Calculation Methodology
The System Operator is required, to advise:
- an explanation of the methodology and procedures it will employ in formulating constraints, including how information about stability and transmission limits are used to define constraint parameters
- when the information can be published
- automated processes and systems used in formulating constraints.
The System Operator is also required to advise participants of the constraint percentage threshold, being the threshold at which SFT constraints are created. The initial threshold for SFT constraints is 90% and 0% for manual constraints. The above is best illustrated in the linked process flowcharts below and the SFT FAQs sheet [ pdf 130.91 KB ].
Name/Link to Diagram | Description |
---|---|
![]() |
This diagram shows the SFT Security Constraint development process used by the SFT application. Additional information about inputs/parameters/ outputs can been seen by hovering the cursor over the boxes with yellow icons in them. |
![]() |
Page 1 of this diagram shows the process used by the SFT Constraint Builder to create Security Constraints, page 2 is the same diagram with additional details added |
Procedures for Managing Security Constraints
The System Operator uses a number of procedures to manage the creation and maintenance of security constraints. We have published a combination of procedures and summary flow charts that may be of interest to market participants:
![]() |
![]() |