Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Administering ArcGIS for Server

You're reading from   Administering ArcGIS for Server ArcGIS for Server may be relatively new technology, but it doesn't have to be daunting. This book will take you step by step through the whole process, from customizing the architecture to effective troubleshooting.

Arrow left icon
Product type Paperback
Published in Jan 2014
Publisher
ISBN-13 9781782177364
Length 246 pages
Edition Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Hussein Nasser Hussein Nasser
Author Profile Icon Hussein Nasser
Hussein Nasser
Arrow right icon
View More author details
Toc

Table of Contents (18) Chapters Close

Administering ArcGIS for Server
Credits
Foreword
About the Author
About the Reviewers
www.PacktPub.com
Preface
1. Best Practices for Installing ArcGIS for Server 2. Authoring Web Services FREE CHAPTER 3. Consuming GIS Services 4. Planning and Designing GIS Services 5. Optimizing GIS Services 6. Clustering and Load Balancing 7. Securing ArcGIS for Server 8. Server Logs Selecting the Right Hardware Server Architecture Index

Hypertext Transfer Protocol Secure (HTTPS)


Whatever authentication method you have used to secure your GIS services, it will eventually achieve the one thing it is intended to, authentication. However, after authentication, the transmission of packets between client and server is all done in naked plain text. If you used tokens, someone can intercept and start working on breaking your token into its main components: the username and the password. If it is a long-lived token, chances are that it might be broken. Another eavesdropper might not even need to break the token; he/she will simply listen to the transmission, borrow the token, and re-use it in a reply attack. The same applies on the Web tier security, which is why securing the very channel on which the whole thing is staged is essential to protect all communication, and this is done using the HTTPS protocol.

Note

A reply attack is a malicious network data transmission that seems valid. It is performed by repeating the request by changing...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime