In this chapter, you have learned that ArcGIS for Server offers a good security mechanism to protect your GIS services, which are distributed across the network infrastructure. You now know that there are three methods to secure ArcGIS for Server. The first method, the GIS-tier, uses native ArcGIS token security, which does protection at the GIS service-level; the second one, the Web-tier, is the Web server security, which is applied at the Web server level; and the last one is the protocol security securing the transmission of the GIS data. The Web-tier security proves to be a better choice in an environment where security is crucial, while GIS-tier can be used for small-scale organizations. In the next chapter, you will learn how to analyze log messages generated by Server to find patterns that may help you optimize your environment.
Administering ArcGIS for Server
By :
Administering ArcGIS for Server
By:
Overview of this book
Table of Contents (18 chapters)
Administering ArcGIS for Server
Credits
Foreword
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Best Practices for Installing ArcGIS for Server
Authoring Web Services
Consuming GIS Services
Planning and Designing GIS Services
Optimizing GIS Services
Clustering and Load Balancing
Securing ArcGIS for Server
Server Logs
Selecting the Right Hardware
Server Architecture
Index
Customer Reviews