Book Image

Mastering Geoserver

By : Colin Henderson
Book Image

Mastering Geoserver

By: Colin Henderson

Overview of this book

Table of Contents (19 chapters)
Mastering GeoServer
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Using HTTP Header for user authentication


The previous authentication providers that we discussed are widely used in an enterprise environment, and we have seen how we can utilize them in GeoServer. In using these providers, we have been responsible for configuring GeoServer to connect to the providers as well as setting up the security rules against authenticated users. In n-tier architectures, it is common that authentication of users occurs in a different tier to that in which GeoServer sits. In other words, the act of authentication and authorization can occur in another system, such as a proxy. This approach makes it possible to integrate with another security system, for example, a system that implements the OGC Geospatial Digital Rights Management Reference Model (GeoDRM RM).

GeoDRM RM provides a mechanism to allow organizations to secure their web mapping servers based on the rights of the user. For example, it is possible to lock down access to specific resources that are constrained...