Documentation
Products
Identity Service map.apps map.apps Advanced Editing map.apps ETL map.apps SDI map.apps Smart Search security.manager - Enterprise Edition security.manager for OGC security.manager NEXT service.monitor smart.finder smart.finder SDI
con terra Logo
English | Deutsch

security.manager for OGC

    • Release notes
    • Installation
    • Getting started
      • Secure WMS
        • Allow access to WMS
        • Control access to layers
        • Restrict access spatially
        • Bind access to roles
      • Secure WFS
        • Allow access to WFS
        • Control access to FeatureTypes
        • Restrict access spatially
        • Bind access to roles
    • How-to guides
      • Configuration & Operation
        • Connect Identity Service
        • Change data directory
        • Change configuration directory
        • Configure URL rewriting
        • Run without Tomcat
        • Deploy web app under '/'
      • Secure services
        • Reference roles from an identity provider
        • Allow access to paths
        • Protect an arbitrary service
        • Protect WMS and WFS with same path
        • Protect service requiring authentication
      • Use services
        • QGIS
        • ArcGIS Pro
    • Concepts
      • Data and configuration directories
      • Request mapping
      • Transactional WFS
    • Reference
      • Configuration
        • application.properties
        • secrets.properties
        • server-config.json
        • Policies
        • Geometries
      • System Requirements
      • Limitations

con terra Portal | Privacy | Imprint

  • security.manager for OGC
  • Getting started
  • Secure WFS

Secure WFS

Secure WFS

In the following tutorials, you will learn how to use security.manager for OGC to control access to your WFS services.

The basics are explained in Allow access to WFS. Here you will learn which steps and files are necessary to make a WFS accessible to everyone.

In the follow-on tutorials

  • Control access to FeatureTypes

  • Restrict access spatially

  • Bind access to roles

you will learn how to further restrict access.