Security Concepts |
|
| Release 9.3.1 |
|
This section discusses security concepts that are specific to the Geoportal extension. Overarching security concepts for an enterprise system can be found at the ESRI Enterprise Resource Center security webpage.
The main topics that this section will address are:
An organization may want data to be discoverable to certain groups of people, but not discoverable to other groups. Access to metadata records can be configured in the Geoportal by implementing a security policy for metadata access. The access policy chosen by the implementing organization will determine if and how a publisher can restrict access to his/her metadata.
IMPORTANT: Restricting user access to metadata records only restricts who can see the metadata. It does not determine user access to the actual data or web service resource itself.
For more information on securing metadata please see How to Restrict Access to Metadata.
Another way to secure your Geoportal is to manage access through the system architecture. Three models are briefly described below.
Hypertext Transfer Protocol - Secure (HTTPS) is a variant of HTTP enhanced by a security mechanism such as an encrypted Secure Sockets Layer (SSL) or Transport Layer Security (TLS) connection. It allows data sharing to take place on the internet in a protected way.
The article Setting up SSL provides a good introduction to SSL and considerations for setting it up on your system.
Besides general SSL configurations for your organization (see Security Resources for Geoportal System Environment Components), there are no Geoportal-specific configurations required, with the exception of full url references.
For example, if you've configured a Map Viewer application to run from your Geoportal under https, then it needs to be specified correctly within gpt.xml:
mapViewerUrl="https://host:port/mvs_viewer"
This section describes some important concepts for encryption within the Geoportal Extension.
In the gpt.xml file, there are sections where you can specify if the password is encrypted. When encryption is set to true, an encrypted password can be defined in these sections. To generate an encrypted password for storing passwords in the gpt.xml, follow the steps below:
In the Manage Repositories page, it is possible to define a connection to another catalog that requires a username and password. To protect the security of these remote catalogs, the Geoportal will not store the password in clear text in its Harvesting tables and configuration files. Instead, the Geoportal will apply an encryption algorithm to store the password. When the Harvesting Tool uses the password information to connect to the repository, it decrypts the password.
Because all Geoportal instances out-of-the-box use the same encryption key, it is important to change the value in the <encKey> section of the gpt.xml file so the encrypted passwords cannot be easily deciphered.
Because the Geoportal extension is deployed in the context of other products upon which it depends, it is important to investigate security recommendations from those other underlying technologies.
Here are some useful documents that can be used for reference: