Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Administering ArcGIS for Server

You're reading from   Administering ArcGIS for Server ArcGIS for Server may be relatively new technology, but it doesn't have to be daunting. This book will take you step by step through the whole process, from customizing the architecture to effective troubleshooting.

Arrow left icon
Product type Paperback
Published in Jan 2014
Publisher
ISBN-13 9781782177364
Length 246 pages
Edition Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Hussein Nasser Hussein Nasser
Author Profile Icon Hussein Nasser
Hussein Nasser
Arrow right icon
View More author details
Toc

Table of Contents (18) Chapters Close

Administering ArcGIS for Server
Credits
Foreword
About the Author
About the Reviewers
www.PacktPub.com
Preface
1. Best Practices for Installing ArcGIS for Server 2. Authoring Web Services FREE CHAPTER 3. Consuming GIS Services 4. Planning and Designing GIS Services 5. Optimizing GIS Services 6. Clustering and Load Balancing 7. Securing ArcGIS for Server 8. Server Logs Selecting the Right Hardware Server Architecture Index

GIS server tier – ArcGIS token security


The ArcGIS for Server token method is a built-in security mechanism to authenticate requests made to the GIS services. Esri had to develop their own authentication method in order to not be dependent on an existing preparatory product. Here is how it works:

  1. The client makes a request to consume a GIS service.

  2. ArcGIS for Server prompts for the username and password.

  3. The client supplies the credentials and then Server verifies that against the user store.

  4. If the username and password are valid, the Server combines the username, the password, and the expiration period of the token, and applies the Advanced Encryption Standard (AES) along with a shared key to encrypt all that into a string, which is known as a token.

  5. The token is then appended to each request until it expires.

The following diagram shows the entire process:

There are two types of tokens, short-lived and long-lived. The short-lived tokens have a relatively shorter expiration period; these are...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime