building secure applications
play

Building Secure Applications Greg Ponto & Tom Shippee - PowerPoint PPT Presentation

Esri International User Conference San Diego, California Technical Workshops | July 26, 2012 Building Secure Applications Greg Ponto & Tom Shippee Presentation agenda Overview - Exploring 10.1 architecture Beginners: - Using 10.1


  1. Esri International User Conference San Diego, California Technical Workshops | July 26, 2012 Building Secure Applications Greg Ponto & Tom Shippee

  2. Presentation agenda • Overview - Exploring 10.1 architecture • Beginners: - Using 10.1 pre-configured security • Experts: - Leveraging existing web security

  3. Section A Exploring 10.1 architecture Thomas Shippee

  4. ArcGIS 10.1 for Server architecture • Self-contained • Simplified • Standards-based • Synergized

  5. Architecture at 10.0 GIS Services Service Authorization Data Tier Internal External Application GIS Tier Web Tier Web Tier Tier SOM IIS LAN ArcGIS LAN HTTPS HTTPS Enterprise DCOM Web Geodatabase SOC SOC Reverse custom code for proxy IIS ArcGIS tokens SQL Server Windows Proxy Page users & roles security store ArcGIS tokens DMZ Web Internal Network

  6. Architectural transition GIS Services Service Authorization Data Tier Internal Web Tier External Application GIS Tier Application Web Tier Web Tier Tier Tier GIS Servers SOM IIS IIS LAN ArcGIS LAN HTTPS HTTPS Enterprise DCOM Web Geodatabase SOC SOC Reverse custom code for Wizard builder Web Adaptor proxy IIS ArcGIS tokens Built-in store Identity manager SQL Server Windows Proxy Page users & roles security store ArcGIS Server Site ArcGIS tokens DMZ Web Internal Network

  7. Default 10.1 security configuration GIS Services Service Authorization Application GIS Tier Data Tier Web Tier Tier GIS Servers IIS LAN HTTPS HTTPS Enterprise Geodatabase Wizard builder Web Adaptor Built-in store Identity manager ArcGIS Server Site Internal Network DMZ Web

  8. Section B Using 10.1 pre-configured security Thomas Shippee

  9. Default 10.1 security workflow � Create site � Define Primary Site Administrator � Configure administrative security � Define “Administrator” and “Publisher” type roles � Assign user to appropriate roles � Create Desktop connections & publish services � Configure service access security � Define “User” type roles � Assign as permissions to folders/services � Assign users to appropriate roles � Build Web Applications � Create web apps (Web API viewer-builders)

  10. Demo � Create site � Define Primary Site Administrator � Configure administrative security � Define “Administrator” and “Publisher” type roles � Assign user to appropriate roles � Create Desktop connections & publish services � Configure service access security � Define “User” type roles � Assign as permissions to folders/services � Assign users to appropriate roles � Build Web Applications � Create web apps (Web API viewer-builders)

  11. Administrative Security Primary Site Administrator (PSA) myAdmins Site Alex Admin Default myAdmin Services Accounts Roles Privileges Paul Penny myPubs Pat myPubs myPubs Services myPubs

  12. Demo � Create site � Define Primary Site Administrator � Configure administrative security � Define “Administrator” and “Publisher” type roles � Assign user to appropriate roles � Create Desktop connections & publish services � Configure service access security � Define “User” type roles � Assign as permissions to folders/services � Assign users to appropriate roles � Build Web Applications � Create web apps (Web API viewer-builders)

  13. Service security: Use case • Public – View Only: - Trails - Campgrounds • Gina (Guide) – Edit: - Trails - Campgrounds • Rick (Ranger) – Edit: - Trails - Campgrounds - Restricted Areas

  14. GIS service security Accounts Permissions Roles Rick Site Admin guides Service Root guides Natural Resources rangers guides Secured Gina Restricted rangers Areas Trails George guides rangers guides guides guides

  15. Demo � Create site � Define Primary Site Administrator � Configure administrative security � Define “Administrator” and “Publisher” type roles � Assign user to appropriate roles � Create Desktop connections & publish services � Configure service access security � Define “User” type roles � Assign as permissions to folders/services � Assign users to appropriate roles � Build Web Applications � Create web apps (Web API viewer-builders)

  16. • Automatically manages ArcGIS tokens • Flex API & Viewer 2.5.1+ (works with ArcGIS 10.0 SP-1+) Web App Token Secured Token Secured Service Service

  17. SECTION C Leveraging existing web security: Gregory Ponto

  18. Web tier single-sign-on at 10.1 GIS Services Service Authorization Application GIS Tier Data Tier Web Tier Tier GIS Servers Shared key IIS LAN HTTP HTTP Enterprise Geodatabase Single sign-on Active Directory Web Adaptor ArcGIS security store Server Site Internal Network DMZ Web

  19. Workflow � Configure Security Store � Users & Roles = Active Directory � Authentication Tier = Web Adaptor � Define Shared Key � Grant Role Access to Services � Configure Web Adaptor � Specify Shared Key � Configure Integrated Windows (IIS) � Build Web Applications

  20. Demo � Configure Security Store � Users & Roles = Active Directory � Authentication Tier = Web Adaptor � Define Shared Key � � � � �

  21. Demo � � � � � Grant Role Access to Services � � � �

  22. Demo � � � � � � Configure Web Adaptor � Specify Shared Key � Configure Integrated Windows (IIS) �

  23. Demo � � � � � � � � � Build Web Applications

  24. What Architecture is Right for Me? Capability Security Store Authentication Authentication Application Encryption Tier Method Tier (HTTPS) Single Sign On Active Directory Web Tier (IIS) Integrated Any w/ SSO Optional Windows (IIS) Support Public/Private Any GIS Tier ArcGIS Tokens Any * Recommended Services Enterprise Users Active Directory, Any Any Any * Recommended & Roles LDAP Web Editing Any Any Any Any * Recommended Mobile Any Any Any Any * Recommended Applications SharePoint Any Any Any Any * Recommended Enterprise Users Active Directory, Any Any Any * Recommended & Built In Roles LDAP Linux LDAP, Built-In Any Any Any * Recommended ArcGIS Online Any Any Any Any * Recommended * Silverlight & SharePoint require use of Proxy Page for token management.

  25. Steps to evaluate UC sessions • My UC Homepage > “Evaluate Sessions” • Choose session from planner OR • Search for session www.esri.com/ucsessionsurveys

  26. • Thank you for attending • Have fun at UC2012 • Open for Questions • Please fill out the evaluation: www.esri.com/ucsessionsurveys First Offering ID: 809 Second Offering ID: 1928

  27. Wrap-up & Questions RELATED PRESENTATIONS • Securing ArcGIS: Best Practices for Security Implementations Wed @ 3:15 PM (20 minute) • ??? ?? @ ?:??

Recommend


More recommend