Security information storage |
SuperMap GIS server stores user information in SQLite database by default, and supports storing user information in MySQL/Oracle/PostgreSQL databases, and other custom storage locations.
Administrators can set the storage location for security information on the Security->Security Config page. Specifically, the administrator can:
The SuperMap GIS server stores security information and service information in a SQLite database by default, For example, the storage directory is located in 【SuperMap iServer installation directory】\webapps\iserver\WEB-INF, which corresponds to iserver-security.db and iserver-services.db respectively.
You can modify the location and name of the SQLite database that stores the security and service information as needed. For example, change security info storage location to ./WEB-INF/iserver-security2016, click the Switch button, and the iServer will automatically initialize the administrator information (when starting the iServer for the first time) synchronizing to 【SuperMap iServer installation directory】\webapps\iserver\WEB-INF\iserver-security2016.db. The database is also used to store subsequently generated security information.
SuperMap GIS server supports security info storage in MySQL database. If you don't already have MySQL available service, you need to install and configure the data library first. For details, please refer to MySQL installation and configuration . The configuration of using MySQL database to store security information is as follows:
The SuperMap GIS server supports security info storage in an Oracle database. If you do not already have Oracle available service, you need to install and configure the data library first. For specific methods, please refer to Oracle installation and configuration . Use The Oracle database is configured to store security information as follows:
SuperMap GIS server supports security info storage in PostgreSQL, Kingbase, GaussDB. Vastbase and GBase 8c databases, and the configuration methods for the five databases are the same.
Using PostgreSQL as an example, if you don't have the PostgreSQL service available, you need to install and configure the data library first For details, please refer to: PostgreSQL installation and configuration . Use the PostgreSQL database is configured to store security information as follows:
Note:
If you need to store security information in non-public mode in databases such as PostgreSQL, Kingbase, GaussDB, Vastbase, etc., there are two configuration methods:
1. In iServer Service Manager, add the currentSchema configuration in the Security Config ->Security Info storage ->Service address configuration option, for example: 172.16.112.200:5432/postgres? currentSchema=postgres_schema
2. Add the currentSchema configuration to the jdbcUrl parameter in the storage node of the iserver-system.xml system configuration file, for example: jdbc: p ostgresql://172.16.112.200:5432/postgres?currentSchema=postgres_schema
When the Switch button is clicked, the iServer will automatically initialize the administrator information (when starting the iServer for the first time) synchronizing to the configured database, which is also used to store subsequently generated security information.
In addition, if you want to switch back to the default local SQLite database, just select the storage location as SQLite database.
If the above user storage methods cannot meet the requirements, you can customize the storage method of user information based on the SecurityInfoStorage interface. For a detailed description of the extension method, please refer to: Storage Method of Extended User Information.