Managing Server Security
|
77
The following table provides a summary of the differences between the two
security methods.
Choosing the Best Security Method
The following table offers recommendations about when each security
method is most appropriate.
Users/Groups/Passwords
Access Keys
Time Period
Active until deleted.
Preset time periods.
End-User
Interaction
User must enter correct name
and password.
No end-user interaction.
Implementa-
tion
Use Autodesk MapGuide Server
Admin to enter and maintain
users, groups, and passwords.
Use Autodesk MapGuide
Author to enter access keys in
MWFs; use Autodesk
MapGuide Server Admin to
link access keys to resources
at the server level.
Authorization
Frequency
Checked once per resource per
layer request (until the user
exits the current browser
session).
Checked by Autodesk
MapGuide Server for every
layer request.
Goal
Method
Provide MWF files for a certain
group of users only.
Use the security protection in your HTTP server to
provide the MWF files to only a defined user
group.
Allow user of Autodesk
MapGuide Author to change
styles but not map content.
Use access keys. You may want to allow a specific
group of map authors to change styles and display
ranges without being able to create new layers or
add layer files. In this case, you can protect your
resources with access keys. When you save a layer
to an MLF (Map Layer File), do not select the
Include Access Key In Map Layer File option. If
users want to add that layer to a map or create a
new layer, they must enter the correct access key
for the resource, or Autodesk MapGuide Server will
not respond to a request for that resource.
Содержание 15606-011408-9320 - MAP R6.3 CPU MODEL-UPG 4/5 MIN 2 CPUS INITL
Страница 1: ...15505 010000 5020 July 2000 USER S GUIDE ...
Страница 8: ...viii ...
Страница 26: ...26 ...
Страница 88: ...88 ...
Страница 146: ...146 ...
Страница 168: ...168 ...