Using HTTP Header for user authentication

The previous authentication providers that we discussed are widely used in an enterprise environment, and we have seen how we can utilize them in GeoServer. In using these providers, we have been responsible for configuring GeoServer to connect to the providers as well as setting up the security rules against authenticated users. In n-tier architectures, it is common that authentication of users occurs in a different tier to that in which GeoServer sits. In other words, the act of authentication and authorization can occur in another system, such as a proxy. This approach makes it possible to integrate with another security system, for example, a system that implements the OGC Geospatial Digital Rights ...

Get Mastering GeoServer now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.