• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Securing GIS data
 

Securing GIS data

on

  • 2,106 views

How to secure GIS data. Using some examples of good and bad. Uses Geomajas as reference for a secure GIS data integration server.

How to secure GIS data. Using some examples of good and bad. Uses Geomajas as reference for a secure GIS data integration server.

Statistics

Views

Total Views
2,106
Views on SlideShare
1,863
Embed Views
243

Actions

Likes
0
Downloads
14
Comments
0

2 Embeds 243

http://blog.progs.be 241
http://translate.googleusercontent.com 2

Accessibility

Categories

Upload Details

Uploaded via as OpenOffice

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Securing GIS data Securing GIS data Presentation Transcript

    • Securing GIS data by Joachim Van der Auwera
      • Secure
      • Authentication
        • Support strong credentials : certificates, eID, biometric
      • Authorization
        • Powerful and fine grained
      • No credential leakage
      • No data leakage
    • Web server Data source Data source Browser view Filter & display data Get application (cred) Get data (cred) Get data (cred) View source / firebug Wms?user=bla&password=alb Unfiltered data internet
        The bad
      Web client
      • Geomajas
      • GIS application framework for the web
      • Integrate GIS data sources
      • Make data available on the web (view / edit)
      • Secure
      • Fast
      • Powerful
      • Java : Spring, Hibernate,
      • GWT, GeoTools
    • Geomajas Data source Data source Browser view Display data View source / firebug internet Wms?token=xyz Filtered data Get application (token) DMZ LAN/WAN Get data (token)
        Architecture
      Web client
      • Policies
      • Application access
      • Layer access (CRUD)
      • Command access (execute)
      • Tool access (execute)
      • Layer Policies
      • Search
      • Area (CRUD)
        • What with overlap, partly in area
      • Individual features (CRUD)
      • Individual feature attributes (CRUD)
      • Custom application policies (extend security context)
    • Geomajas Data source Browser view Display data Get data (token) Get data (cred) View source / firebug Wms?token=xyz Filtered data filter ¶ · ¸ ¹ º »
        Security proxy
      Web client
      • Login – Single Sign On
      • Login is external
      • Application does not know credentials
      • Security context
      • Based on token
      • Allows access to policies
      • Snooping
      • Should all communication be encrypted?
      • Login credentials : yes
      • Token : no (only valid for a while)
      • Data : once transmitted it can be stolen
        • Always at the client
        • In transit when not encrypted
      • Conclusions
      • Geomajas allows you to build highly secure GIS system supporting
        • Single sign-on
        • Highly secure credentials (optional)
        • Fine grained policies
        • No credential leaking
        • No leakage of unauthorized data
      • Questions? Thanks!
      Contact me : Mail : [email_address] Blog : http://blog.progs.be/ Twitter : @joachimvda http:// www.geomajas.org http:// www.geosparc.com