{"id":2557602,"date":"2024-11-20T09:30:34","date_gmt":"2024-11-20T17:30:34","guid":{"rendered":"https:\/\/www.esri.com\/arcgis-blog\/?post_type=blog&#038;p=2557602"},"modified":"2024-11-20T10:28:56","modified_gmt":"2024-11-20T18:28:56","slug":"introducing-the-security-and-authentication-guide-for-developers","status":"publish","type":"blog","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers","title":{"rendered":"Introducing the Security and Authentication guide for developers"},"author":338372,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":""},"categories":[738191],"tags":[758502,42301,42641,764502,23571],"industry":[],"product":[36571,761642,36551],"class_list":["post-2557602","blog","type-blog","status-publish","format-standard","hentry","category-developers","tag-app-development","tag-arcgis-enterprise","tag-arcgis-online","tag-authentication","tag-whats-new","product-arcgis-enterprise","product-platform","product-arcgis-online"],"acf":{"authors":[{"ID":338372,"user_firstname":"George","user_lastname":"Owen","nickname":"George Owen","user_nicename":"gowen","display_name":"George Owen","user_email":"gowen@esri.com","user_url":"https:\/\/geowen.dev\/","user_registered":"2023-05-02 18:08:00","user_description":"George is a product engineer for the Developer Experience team. He is responsible for maintaining Esri's documentation on open source libraries.","user_avatar":"<img data-del=\"avatar\" src='https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/05\/george-owen-headshot-700kb-2-465x465.jpg' class='avatar pp-user-avatar avatar-96 photo ' height='96' width='96'\/>"},{"ID":3791,"user_firstname":"Allan","user_lastname":"Laframboise","nickname":"Allan Laframboise","user_nicename":"alaframboise","display_name":"Allan Laframboise","user_email":"alaframboise@esri.com","user_url":"","user_registered":"2018-03-02 00:15:25","user_description":"Allan Laframboise is the product engineering lead for documentation for the Developer Experience team.","user_avatar":"<img alt='' src='https:\/\/secure.gravatar.com\/avatar\/af35f23e49f7a462c9c1b97ec1033d5804a0a99ee5b8d6ed09394c1208abf8c9?s=96&#038;d=blank&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/af35f23e49f7a462c9c1b97ec1033d5804a0a99ee5b8d6ed09394c1208abf8c9?s=192&#038;d=blank&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/>"}],"short_description":"Learn about how the security and authentication guide is an essential resource for all developers building custom applications with ArcGIS.","flexible_content":[{"acf_fc_layout":"image","image":{"ID":2593122,"id":2593122,"title":"security-and-auth-blog-2","filename":"security-and-auth-blog-2.png","filesize":152609,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-and-auth-blog-2.png","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers\/security-and-auth-blog-2","alt":"","author":"3791","description":"","caption":"","name":"security-and-auth-blog-2","status":"inherit","uploaded_to":2557602,"date":"2024-11-19 01:42:11","modified":"2024-11-19 01:42:41","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":902,"height":622,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-and-auth-blog-2-213x200.png","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-and-auth-blog-2.png","medium-width":378,"medium-height":261,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-and-auth-blog-2.png","medium_large-width":768,"medium_large-height":530,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-and-auth-blog-2.png","large-width":902,"large-height":622,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-and-auth-blog-2.png","1536x1536-width":902,"1536x1536-height":622,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-and-auth-blog-2.png","2048x2048-width":902,"2048x2048-height":622,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-and-auth-blog-2-674x465.png","card_image-width":674,"card_image-height":465,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-and-auth-blog-2.png","wide_image-width":902,"wide_image-height":622}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<p><span data-contrast=\"auto\">Earlier this year we released a new <\/span><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/\"><span data-contrast=\"none\">Security and authentication<\/span><\/a><span data-contrast=\"auto\"> developer guide.\u00a0<\/span><span data-contrast=\"auto\">This article takes a look at what&#8217;s inside the guide and at some of the key resources that will help you learn how to implement authentication for your applications.<\/span><\/p>\n<h2><span data-contrast=\"none\">Who is it for?<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:360,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The new Security and authentication guide is an essential resource for all developers using ArcGIS technology to create custom applications. It is for any developer who has <a href=\"https:\/\/location.arcgis.com\/\">ArcGIS Location Platform,<\/a>\u00a0<\/span><a href=\"https:\/\/www.esri.com\/en-us\/arcgis\/products\/arcgis-online\/overview\"><span data-contrast=\"none\">ArcGIS Online<\/span><\/a><span data-contrast=\"auto\">, or <\/span><a href=\"https:\/\/enterprise.arcgis.com\/en\/\"><span data-contrast=\"none\">ArcGIS Enterprise.<\/span><\/a>\u00a0<span data-contrast=\"auto\">Setting up authentication is always a prerequisite for accessing ArcGIS resources, so regardless of whether you intend to use <\/span><a href=\"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-mapping-and-location-services-guide-for-developers\/\"><span data-contrast=\"none\">Location services<\/span><\/a><span data-contrast=\"auto\">, <\/span><a href=\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-online\/developers\/introducing-the-spatial-analysis-services-guide-for-developers\/\"><span data-contrast=\"none\">Spatial analysis services<\/span><\/a><span data-contrast=\"auto\">, the <\/span><a href=\"https:\/\/www.esri.com\/arcgis-blog\/products\/developers\/developers\/introducing-the-portal-and-data-services-guide-for-developers\/\"><span data-contrast=\"none\">Portal service<\/span><\/a><span data-contrast=\"auto\">, or anything else, you\u2019ll be making a pit stop in the authentication guide.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">What\u2019s inside?<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:360,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The security and authentication guide contains everything you need to know about authentication with ArcGIS, from the basic concepts to advanced implementations. <\/span><span data-ccp-props=\"{&quot;335559685&quot;:0}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The guide begins with <\/span><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/introduction\/\"><span data-contrast=\"none\">Introduction to security and authentication,<\/span><\/a><span data-contrast=\"auto\"> a page that explains the fundamentals of what authentication is and why it\u2019s required in your applications.\u00a0The <\/span><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/types-of-authentication\/\"><span data-contrast=\"none\">Types of authentication<\/span><\/a><span data-contrast=\"auto\"> and <\/span><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/how-to-use-authentication\/\"><span data-contrast=\"none\">How to use authentication<\/span><\/a><span data-contrast=\"auto\"> pages expand on the introduction, laying the foundation for the rest of the guide to come.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:0}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n"},{"acf_fc_layout":"image","image":{"ID":2557632,"id":2557632,"title":"security-guide-overview","filename":"security-guide-overview.png","filesize":255448,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-guide-overview.png","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers\/security-guide-overview","alt":"","author":"338372","description":"","caption":"","name":"security-guide-overview","status":"inherit","uploaded_to":2557602,"date":"2024-11-04 06:05:22","modified":"2024-11-04 06:05:39","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":1969,"height":1313,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-guide-overview-213x200.png","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-guide-overview.png","medium-width":391,"medium-height":261,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-guide-overview.png","medium_large-width":768,"medium_large-height":512,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-guide-overview.png","large-width":1620,"large-height":1080,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-guide-overview-1536x1024.png","1536x1536-width":1536,"1536x1536-height":1024,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-guide-overview.png","2048x2048-width":1969,"2048x2048-height":1313,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-guide-overview-697x465.png","card_image-width":697,"card_image-height":465,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/security-guide-overview-1620x1080.png","wide_image-width":1620,"wide_image-height":1080}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<h3><span data-contrast=\"none\">Types of authentication<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Authentication with ArcGIS can take several different forms depending on the type of authentication you choose to use. The guide includes a chapter for each of the supported types of authentication:<\/span><span data-ccp-props=\"{&quot;335559685&quot;:0}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/api-key-authentication\/\"><span data-contrast=\"none\">API key authentication<\/span><\/a><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/user-authentication\/\"><span data-contrast=\"none\">User authentication<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/app-authentication\/\"><span data-contrast=\"none\">App authentication<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Each chapter explains how to implement one type of authentication to access secure resources in ArcGIS. They also cover best practices related for implementing each type of authentication.<\/span><\/p>\n"},{"acf_fc_layout":"image","image":{"ID":2557642,"id":2557642,"title":"Authentication fundamentals","filename":"auth_basics.png","filesize":21772,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/auth_basics.png","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers\/auth_basics","alt":"The fundamentals of authentication with ArcGIS","author":"338372","description":"","caption":"","name":"auth_basics","status":"inherit","uploaded_to":2557602,"date":"2024-11-04 06:06:31","modified":"2024-11-04 06:06:49","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":995,"height":712,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/auth_basics-213x200.png","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/auth_basics.png","medium-width":365,"medium-height":261,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/auth_basics.png","medium_large-width":768,"medium_large-height":550,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/auth_basics.png","large-width":995,"large-height":712,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/auth_basics.png","1536x1536-width":995,"1536x1536-height":712,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/auth_basics.png","2048x2048-width":995,"2048x2048-height":712,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/auth_basics-650x465.png","card_image-width":650,"card_image-height":465,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/auth_basics.png","wide_image-width":995,"wide_image-height":712}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<h3><span data-contrast=\"none\">Tutorials for developer tools<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">In the guide you&#8217;ll also find a number of tutorials that explain how to use developer tools to help you implement authentication. For example, you&#8217;ll learn how to use the developer credential creator in your ArcGIS portal to create API key credentials and OAuth 2.0 credentials for your apps.<\/span><\/p>\n<p><span data-contrast=\"auto\">If you are ready to jump in, check out the tutorials related to API key authentication:<\/span><span data-ccp-props=\"{&quot;335559685&quot;:0}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/api-key-authentication\/tutorials\/create-an-api-key\/\"><span data-contrast=\"none\">Create an API key<\/span><\/a><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/api-key-authentication\/tutorials\/migrate-to-api-key-credentials\/\"><span data-contrast=\"none\">Migrate API keys (legacy) to API key credentials<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/api-key-authentication\/tutorials\/manage-api-key-credentials\/\"><span data-contrast=\"none\">Manage API key credentials<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/api-key-authentication\/tutorials\/rotate-api-keys\/\"><span data-contrast=\"none\">Rotate API keys<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">For a deeper dive, you can also learn how to create OAuth 2.0 credentials to set up user authentication and app authentication:<\/span><span data-ccp-props=\"{&quot;335559685&quot;:0}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"5\" data-aria-level=\"1\"><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/user-authentication\/tutorials\/create-oauth-credentials-user-auth\/\"><span data-contrast=\"none\">Create OAuth credentials for user authentication<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"5\" data-aria-level=\"1\"><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/app-authentication\/tutorials\/create-oauth-credentials-app-auth\/\"><span data-contrast=\"none\">Create OAuth credentials for app authentication<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n"},{"acf_fc_layout":"image","image":{"ID":2557652,"id":2557652,"title":"api-key-tutorial","filename":"api-key-tutorial.png","filesize":232443,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/api-key-tutorial.png","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers\/api-key-tutorial","alt":"The \"Create an API key\" tutorial in the security and authentication guide.","author":"338372","description":"","caption":"","name":"api-key-tutorial","status":"inherit","uploaded_to":2557602,"date":"2024-11-04 06:07:17","modified":"2024-11-04 06:07:30","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":1649,"height":1100,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/api-key-tutorial-213x200.png","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/api-key-tutorial.png","medium-width":391,"medium-height":261,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/api-key-tutorial.png","medium_large-width":768,"medium_large-height":512,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/api-key-tutorial.png","large-width":1619,"large-height":1080,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/api-key-tutorial-1536x1025.png","1536x1536-width":1536,"1536x1536-height":1025,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/api-key-tutorial.png","2048x2048-width":1649,"2048x2048-height":1100,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/api-key-tutorial-697x465.png","card_image-width":697,"card_image-height":465,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/api-key-tutorial-1619x1080.png","wide_image-width":1619,"wide_image-height":1080}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<h3><span data-contrast=\"none\">Workflows for every authentication method<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">In addition to tutorials for developer tools, the guide explains how authentication works on a technical level. In particular, the <\/span><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/user-authentication\/\"><span data-contrast=\"none\">user authentication chapter<\/span><\/a><span data-contrast=\"auto\"> provides a deep dive into how OAuth 2.0 user authentication works with ArcGIS.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:0}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The <\/span><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/user-authentication\/flows\/\"><span data-contrast=\"none\">user authentication flows<\/span><\/a><span data-contrast=\"auto\"> section expands on this, explaining every supported workflow for user authentication in a dedicated page. For example, the commonly used <\/span><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/user-authentication\/flows\/authorization-code-with-pkce\/\"><span data-contrast=\"none\">Authorization code flow with PKCE<\/span><\/a><span data-contrast=\"auto\"> has its own page that documents its OAuth 2.0 flow diagram and implementation details with ArcGIS.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:0}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Similarly to user authentication, the app authentication chapter explains the <\/span><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/app-authentication\/client-credentials-flow\/\"><span data-contrast=\"none\">Client credentials flow<\/span><\/a><span data-contrast=\"auto\"> with detailed implementation steps. It also includes links to <\/span><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/app-authentication\/tutorials\/\"><span data-contrast=\"none\">Code examples<\/span><\/a><span data-contrast=\"auto\"> hosted on GitHub.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:0}\">\u00a0<\/span><\/p>\n"},{"acf_fc_layout":"image","image":{"ID":2557662,"id":2557662,"title":"flow-auth-code-pkce","filename":"flow-auth-code-pkce.png","filesize":29301,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/flow-auth-code-pkce.png","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers\/flow-auth-code-pkce","alt":"A diagram showing the OAuth 2.0 \"Authorization code flow\" with PKCE.","author":"338372","description":"","caption":"","name":"flow-auth-code-pkce","status":"inherit","uploaded_to":2557602,"date":"2024-11-04 06:07:52","modified":"2024-11-04 06:08:34","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":995,"height":717,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/flow-auth-code-pkce-213x200.png","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/flow-auth-code-pkce.png","medium-width":362,"medium-height":261,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/flow-auth-code-pkce.png","medium_large-width":768,"medium_large-height":553,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/flow-auth-code-pkce.png","large-width":995,"large-height":717,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/flow-auth-code-pkce.png","1536x1536-width":995,"1536x1536-height":717,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/flow-auth-code-pkce.png","2048x2048-width":995,"2048x2048-height":717,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/flow-auth-code-pkce-645x465.png","card_image-width":645,"card_image-height":465,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/flow-auth-code-pkce.png","wide_image-width":995,"wide_image-height":717}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<h3><span data-contrast=\"none\">&#8230;And more!<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">A few additional pages round out the rest of the guide, including detailed <\/span><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/security-best-practices\/\"><span data-contrast=\"none\">Best practices<\/span><\/a><span data-contrast=\"auto\"> and <\/span><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/faq\/\"><span data-contrast=\"none\">FAQ<\/span><\/a><span data-contrast=\"auto\"> pages that answer many common questions about authentication. The reference chapter also includes essential pages such as <\/span><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/reference\/privileges\/\"><span data-contrast=\"none\">Privileges<\/span><\/a><span data-contrast=\"auto\"> and <\/span><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/reference\/rest-authentication-operations\/\"><span data-contrast=\"none\">REST authentication operations<\/span><\/a><span data-contrast=\"auto\"> that you may find useful during development.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:0}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">Ready to get started?<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:360,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">If you are ready to started, go to the <\/span><a href=\"https:\/\/developers.arcgis.com\/documentation\/security-and-authentication\/get-started\/\"><span data-contrast=\"none\">Get started<\/span><\/a><span data-contrast=\"auto\"> section of the Security and authentication guide, learn about the types of authentication, and start implementing authentication in your apps.<\/span><\/p>\n<p><span data-contrast=\"auto\">Once you implement authentication, you\u2019ll be able to access many other services and resources offered by Esri, including location services, the portal service, spatial analysis services, and more.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:0}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">We want your feedback!<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:360,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Please take our survey to let us know if the guide was helpful and how we can improve it.\u00a0\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n"},{"acf_fc_layout":"image","image":{"ID":2557672,"id":2557672,"title":"guide-survey-link","filename":"guide-survey-link.png","filesize":113339,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/guide-survey-link.png","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers\/guide-survey-link","alt":"The location of the feedback survey in the Security and authentication ArcGIS developer guide.","author":"338372","description":"","caption":"","name":"guide-survey-link","status":"inherit","uploaded_to":2557602,"date":"2024-11-04 06:09:23","modified":"2024-11-04 06:09:42","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":1599,"height":1013,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/guide-survey-link-213x200.png","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/guide-survey-link.png","medium-width":412,"medium-height":261,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/guide-survey-link.png","medium_large-width":768,"medium_large-height":487,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/guide-survey-link.png","large-width":1599,"large-height":1013,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/guide-survey-link-1536x973.png","1536x1536-width":1536,"1536x1536-height":973,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/guide-survey-link.png","2048x2048-width":1599,"2048x2048-height":1013,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/guide-survey-link-734x465.png","card_image-width":734,"card_image-height":465,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/11\/guide-survey-link.png","wide_image-width":1599,"wide_image-height":1013}},"image_position":"center","orientation":"horizontal","hyperlink":""}],"related_articles":"","card_image":false,"wide_image":false,"show_article_image":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Introducing the Security and Authentication guide for developers<\/title>\n<meta name=\"description\" content=\"The new security and authentication guide is an essential resource for all developers building custom applications with ArcGIS.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introducing the Security and Authentication guide for developers\" \/>\n<meta property=\"og:description\" content=\"The new security and authentication guide is an essential resource for all developers building custom applications with ArcGIS.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers\" \/>\n<meta property=\"og:site_name\" content=\"ArcGIS Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/esrigis\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-20T18:28:56+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ESRI\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers\"},\"author\":{\"name\":\"George Owen\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/8206bd1ec39f9f3d95090b5b75531a44\"},\"headline\":\"Introducing the Security and Authentication guide for developers\",\"datePublished\":\"2024-11-20T17:30:34+00:00\",\"dateModified\":\"2024-11-20T18:28:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers\"},\"wordCount\":8,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#organization\"},\"keywords\":[\"App Development\",\"ArcGIS Enterprise\",\"ArcGIS Online\",\"authentication\",\"what's new\"],\"articleSection\":[\"Developers\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers\",\"name\":\"Introducing the Security and Authentication guide for developers\",\"isPartOf\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#website\"},\"datePublished\":\"2024-11-20T17:30:34+00:00\",\"dateModified\":\"2024-11-20T18:28:56+00:00\",\"description\":\"The new security and authentication guide is an essential resource for all developers building custom applications with ArcGIS.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esri.com\/arcgis-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Introducing the Security and Authentication guide for developers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#website\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/\",\"name\":\"ArcGIS Blog\",\"description\":\"Get insider info from Esri product teams\",\"publisher\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esri.com\/arcgis-blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#organization\",\"name\":\"Esri\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png\",\"contentUrl\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png\",\"width\":400,\"height\":400,\"caption\":\"Esri\"},\"image\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/esrigis\/\",\"https:\/\/x.com\/ESRI\",\"https:\/\/www.linkedin.com\/company\/5311\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/8206bd1ec39f9f3d95090b5b75531a44\",\"name\":\"George Owen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/05\/george-owen-headshot-700kb-2-465x465.jpg\",\"contentUrl\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/05\/george-owen-headshot-700kb-2-465x465.jpg\",\"caption\":\"George Owen\"},\"description\":\"George is a product engineer for the Developer Experience team. He is responsible for maintaining Esri's documentation on open source libraries.\",\"sameAs\":[\"https:\/\/geowen.dev\/\",\"https:\/\/www.linkedin.com\/in\/geoowen\/\"],\"gender\":\"male\",\"jobTitle\":\"product engineer\",\"worksFor\":\"Esri\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/author\/gowen\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Introducing the Security and Authentication guide for developers","description":"The new security and authentication guide is an essential resource for all developers building custom applications with ArcGIS.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers","og_locale":"en_US","og_type":"article","og_title":"Introducing the Security and Authentication guide for developers","og_description":"The new security and authentication guide is an essential resource for all developers building custom applications with ArcGIS.","og_url":"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers","og_site_name":"ArcGIS Blog","article_publisher":"https:\/\/www.facebook.com\/esrigis\/","article_modified_time":"2024-11-20T18:28:56+00:00","twitter_card":"summary_large_image","twitter_site":"@ESRI","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers#article","isPartOf":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers"},"author":{"name":"George Owen","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/8206bd1ec39f9f3d95090b5b75531a44"},"headline":"Introducing the Security and Authentication guide for developers","datePublished":"2024-11-20T17:30:34+00:00","dateModified":"2024-11-20T18:28:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers"},"wordCount":8,"commentCount":1,"publisher":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#organization"},"keywords":["App Development","ArcGIS Enterprise","ArcGIS Online","authentication","what's new"],"articleSection":["Developers"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers","url":"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers","name":"Introducing the Security and Authentication guide for developers","isPartOf":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#website"},"datePublished":"2024-11-20T17:30:34+00:00","dateModified":"2024-11-20T18:28:56+00:00","description":"The new security and authentication guide is an essential resource for all developers building custom applications with ArcGIS.","breadcrumb":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esri.com\/arcgis-blog\/"},{"@type":"ListItem","position":2,"name":"Introducing the Security and Authentication guide for developers"}]},{"@type":"WebSite","@id":"https:\/\/www.esri.com\/arcgis-blog\/#website","url":"https:\/\/www.esri.com\/arcgis-blog\/","name":"ArcGIS Blog","description":"Get insider info from Esri product teams","publisher":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esri.com\/arcgis-blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esri.com\/arcgis-blog\/#organization","name":"Esri","url":"https:\/\/www.esri.com\/arcgis-blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png","contentUrl":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png","width":400,"height":400,"caption":"Esri"},"image":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/esrigis\/","https:\/\/x.com\/ESRI","https:\/\/www.linkedin.com\/company\/5311\/"]},{"@type":"Person","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/8206bd1ec39f9f3d95090b5b75531a44","name":"George Owen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/image\/","url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/05\/george-owen-headshot-700kb-2-465x465.jpg","contentUrl":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/05\/george-owen-headshot-700kb-2-465x465.jpg","caption":"George Owen"},"description":"George is a product engineer for the Developer Experience team. He is responsible for maintaining Esri's documentation on open source libraries.","sameAs":["https:\/\/geowen.dev\/","https:\/\/www.linkedin.com\/in\/geoowen\/"],"gender":"male","jobTitle":"product engineer","worksFor":"Esri","url":"https:\/\/www.esri.com\/arcgis-blog\/author\/gowen"}]}},"text_date":"November 20, 2024","author_name":"Multiple Authors","author_page":"https:\/\/www.esri.com\/arcgis-blog\/products\/platform\/developers\/introducing-the-security-and-authentication-guide-for-developers","custom_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2025\/08\/Newsroom-Keyart-Wide-1920-x-1080.jpg","primary_product":"ArcGIS Location Platform","tag_data":[{"term_id":758502,"name":"App Development","slug":"app-development","term_group":0,"term_taxonomy_id":758502,"taxonomy":"post_tag","description":"","parent":0,"count":7,"filter":"raw"},{"term_id":42301,"name":"ArcGIS Enterprise","slug":"arcgis-enterprise","term_group":0,"term_taxonomy_id":42301,"taxonomy":"post_tag","description":"","parent":0,"count":209,"filter":"raw"},{"term_id":42641,"name":"ArcGIS Online","slug":"arcgis-online","term_group":0,"term_taxonomy_id":42641,"taxonomy":"post_tag","description":"","parent":0,"count":420,"filter":"raw"},{"term_id":764502,"name":"authentication","slug":"authentication","term_group":0,"term_taxonomy_id":764502,"taxonomy":"post_tag","description":"","parent":0,"count":6,"filter":"raw"},{"term_id":23571,"name":"what's new","slug":"whats-new","term_group":0,"term_taxonomy_id":23571,"taxonomy":"post_tag","description":"","parent":0,"count":582,"filter":"raw"}],"category_data":[{"term_id":738191,"name":"Developers","slug":"developers","term_group":0,"term_taxonomy_id":738191,"taxonomy":"category","description":"","parent":0,"count":422,"filter":"raw"}],"product_data":[{"term_id":36571,"name":"ArcGIS Enterprise","slug":"arcgis-enterprise","term_group":0,"term_taxonomy_id":36571,"taxonomy":"product","description":"","parent":0,"count":972,"filter":"raw"},{"term_id":761642,"name":"ArcGIS Location Platform","slug":"platform","term_group":0,"term_taxonomy_id":761642,"taxonomy":"product","description":"","parent":36601,"count":213,"filter":"raw"},{"term_id":36551,"name":"ArcGIS Online","slug":"arcgis-online","term_group":0,"term_taxonomy_id":36551,"taxonomy":"product","description":"","parent":0,"count":2424,"filter":"raw"}],"primary_product_link":"https:\/\/www.esri.com\/arcgis-blog\/?s=#&products=platform","_links":{"self":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/blog\/2557602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/users\/338372"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/comments?post=2557602"}],"version-history":[{"count":0,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/blog\/2557602\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/media?parent=2557602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/categories?post=2557602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/tags?post=2557602"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/industry?post=2557602"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/product?post=2557602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}