<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Confusion regarding the proxy page/HttpHandler in ArcGIS API for Silverlight Questions</title>
    <link>https://community.esri.com/t5/arcgis-api-for-silverlight-questions/confusion-regarding-the-proxy-page-httphandler/m-p/311927#M8011</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Hi all,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I'm brand new at GIS development but I'm reasonably versed in Silverlight/WPF. I've been researching how to secure our map services against Joe Schmoe from connecting to them and using them in their own applications. I read &lt;/SPAN&gt;&lt;A href="http://resources.esri.com/help/9.3/arcgisserver/apis/silverlight/help/secure_services.htm"&gt;this article&lt;/A&gt;&lt;SPAN&gt; and feel like I must be missing something on the whole proxy page idea. How does this enhance security? Can someone not just point at the proxy page and have the same access?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Please help me understand!&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Zak&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Apr 2010 13:03:34 GMT</pubDate>
    <dc:creator>ZakKeown</dc:creator>
    <dc:date>2010-04-28T13:03:34Z</dc:date>
    <item>
      <title>Confusion regarding the proxy page/HttpHandler</title>
      <link>https://community.esri.com/t5/arcgis-api-for-silverlight-questions/confusion-regarding-the-proxy-page-httphandler/m-p/311927#M8011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Hi all,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I'm brand new at GIS development but I'm reasonably versed in Silverlight/WPF. I've been researching how to secure our map services against Joe Schmoe from connecting to them and using them in their own applications. I read &lt;/SPAN&gt;&lt;A href="http://resources.esri.com/help/9.3/arcgisserver/apis/silverlight/help/secure_services.htm"&gt;this article&lt;/A&gt;&lt;SPAN&gt; and feel like I must be missing something on the whole proxy page idea. How does this enhance security? Can someone not just point at the proxy page and have the same access?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Please help me understand!&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Zak&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Apr 2010 13:03:34 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-api-for-silverlight-questions/confusion-regarding-the-proxy-page-httphandler/m-p/311927#M8011</guid>
      <dc:creator>ZakKeown</dc:creator>
      <dc:date>2010-04-28T13:03:34Z</dc:date>
    </item>
    <item>
      <title>Re: Confusion regarding the proxy page/HttpHandler</title>
      <link>https://community.esri.com/t5/arcgis-api-for-silverlight-questions/confusion-regarding-the-proxy-page-httphandler/m-p/311928#M8012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;This is a fairly old post, so I'm assuming you figured this out already.&amp;nbsp; In case you haven't, and for the benefit of everyone who stumbles across this page, I'll explain why it's more secure.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;If you are trying to access secure services, some sort of credentials must be provided.&amp;nbsp; Regardless of whether or not you are using a secure connection, the credentials are passed in plain text.&amp;nbsp; Once your credentials are validated, the token service will send the token in plain text.&amp;nbsp; So there are two chances for someone to intercept valuable information that would allow them to access the site.&amp;nbsp; If they intercepted a token, they can typically only use it for a short period before it expires (in the case of a short term token).&amp;nbsp; If they intercept the username and password, however, they can request tokens that would allow them to access the site for as long as the credentials are valid.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;A scenario that's even worse is if the username and password or token are stored within the application.&amp;nbsp; In this case that's all someone needs to do to discover it is to reverse engineer the application and read it.&amp;nbsp; With all of the tools available this is really easy to do.&amp;nbsp; In some cases, such as javascript, it's already plain text.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Enter the proxy page.&amp;nbsp; The proxy page will typically store either username/password or the actual token.&amp;nbsp; If you don't secure the proxy page, of course anyone can access it.&amp;nbsp; That's why you secure the page, much like you would any page you want to limit views to.&amp;nbsp; At that point you could control who has access to the page and who doesn't.&amp;nbsp; The username/password or token is stored on the server only, and nothing is ever transmitted to the client.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;- Anthony&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 26 Jun 2011 19:19:30 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-api-for-silverlight-questions/confusion-regarding-the-proxy-page-httphandler/m-p/311928#M8012</guid>
      <dc:creator>AnthonyGrescavage</dc:creator>
      <dc:date>2011-06-26T19:19:30Z</dc:date>
    </item>
  </channel>
</rss>

