{"id":2629942,"date":"2024-12-17T14:01:12","date_gmt":"2024-12-17T22:01:12","guid":{"rendered":"https:\/\/www.esri.com\/arcgis-blog\/?post_type=blog&#038;p=2629942"},"modified":"2024-12-18T12:21:18","modified_gmt":"2024-12-18T20:21:18","slug":"enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity","status":"publish","type":"blog","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity","title":{"rendered":"Enhancing Data Security: A Guide to Implementing OAuth in ArcGIS Velocity"},"author":366152,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":""},"categories":[37121],"tags":[756721,777722,407602],"industry":[],"product":[756702],"class_list":["post-2629942","blog","type-blog","status-publish","format-standard","hentry","category-real-time","tag-arcgis-velocity","tag-oauth","tag-real-time-gis","product-arcgis-velocity"],"acf":{"authors":[{"ID":366152,"user_firstname":"Nicole","user_lastname":"Phaneuf","nickname":"Nicole Phaneuf","user_nicename":"nphaneuf","display_name":"Nicole Phaneuf","user_email":"nphaneuf@esri.com","user_url":"","user_registered":"2024-12-11 16:34:13","user_description":"","user_avatar":"<img alt='' src='https:\/\/secure.gravatar.com\/avatar\/4b328063dbc4d7175ec1e621407724b7f2ac2b47154a8f038ea780d8905e22c5?s=96&#038;d=blank&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/4b328063dbc4d7175ec1e621407724b7f2ac2b47154a8f038ea780d8905e22c5?s=192&#038;d=blank&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/>"}],"short_description":"Read this blog article to learn about using OAuth in ArcGIS Velocity.","flexible_content":[{"acf_fc_layout":"content","content":"<p>In modern web-based software, the need for secure and efficient authorization protocols is critical. Traditional methods of granting access to sensitive data often involve sharing usernames and passwords, which presents several risks to organizations. These risks include potential breaches of personal information, unauthorized access, and difficulties in managing permissions across various applications. These risks have resulted in many data providers choosing to secure their data using OAuth, which is an open standard authorization framework. To support ingesting or disseminating data using HTTP endpoints that are secured with OAuth, ArcGIS Velocity supports configuring the HTTP Poller feed and data source types and HTTP output type with OAuth.<\/p>\n<h3><\/h3>\n"},{"acf_fc_layout":"image","image":{"ID":2630062,"id":2630062,"title":"InfoSec_826x465","filename":"InfoSec_826x465.jpg","filesize":50417,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/InfoSec_826x465.jpg","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity\/infosec_826x465","alt":"image of a digital lock","author":"349902","description":"","caption":"","name":"infosec_826x465","status":"inherit","uploaded_to":2629942,"date":"2024-12-17 18:33:28","modified":"2024-12-17 18:33:48","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":826,"height":465,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/InfoSec_826x465-213x200.jpg","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/InfoSec_826x465.jpg","medium-width":464,"medium-height":261,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/InfoSec_826x465.jpg","medium_large-width":768,"medium_large-height":432,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/InfoSec_826x465.jpg","large-width":826,"large-height":465,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/InfoSec_826x465.jpg","1536x1536-width":826,"1536x1536-height":465,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/InfoSec_826x465.jpg","2048x2048-width":826,"2048x2048-height":465,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/InfoSec_826x465.jpg","card_image-width":826,"card_image-height":465,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/InfoSec_826x465.jpg","wide_image-width":826,"wide_image-height":465}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<h3><strong>What is OAuth?<\/strong><\/h3>\n<p>Open Authorization (OAuth) is one of the most commonly used authorization frameworks. OAuth allows you to give one application, in this case, ArcGIS Velocity, permission to access your data or use features in another without directly providing your username and password. Instead of accessing your data source directly with a username and password, OAuth allows you to authorize yourself with an access token.\u00a0An access token provides limited access to data at a secured endpoint for a specific period.<\/p>\n<p>We can think of access tokens like a key card you receive when checking into a hotel. You are authenticated at the front desk using your driver\u2019s license when you arrive at the hotel. Once this is complete, you are provided with a key card. This key card authorizes you to access your hotel room and other amenities like the gym or pool for the duration of your stay. It will only work for the rooms you can access and will not work after your hotel reservation ends. If you lose your key card, anyone else could use it, as it does not retain any information about how you were authenticated when you checked in. If needed, the hotel can also revoke the key card, which will stop working immediately.<\/p>\n<p>Access tokens work very similarly in that we obtain them by authenticating with the authorization server. They specify the resources we can access and the duration of that access. Anyone can use the access token and the token can be revoked at any time.<\/p>\n<h3><strong>General OAuth workflow<\/strong><\/h3>\n"},{"acf_fc_layout":"image","image":{"ID":2630352,"id":2630352,"title":"Image1","filename":"Image1.png","filesize":92070,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image1.png","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity\/image1-29","alt":"Diagram detailing the relationship of ArcGIS Velocity, Authorization Server, and Resource Server.","author":"349902","description":"","caption":"1) The client requests an access token from the authorization server. 2) The authorization server sends an access token to the client. 3) The client uses the access token to request data from the resource server. 4) Data is provided to the client by the resource server. 5)  The client uses the refresh token to obtain a new access token when the access token expires. 6) A new access token is provided to the client by the authorization server.","name":"image1-29","status":"inherit","uploaded_to":2629942,"date":"2024-12-17 20:16:24","modified":"2024-12-17 20:16:47","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":624,"height":265,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image1-213x200.png","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image1.png","medium-width":464,"medium-height":197,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image1.png","medium_large-width":624,"medium_large-height":265,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image1.png","large-width":624,"large-height":265,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image1.png","1536x1536-width":624,"1536x1536-height":265,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image1.png","2048x2048-width":624,"2048x2048-height":265,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image1.png","card_image-width":624,"card_image-height":265,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image1.png","wide_image-width":624,"wide_image-height":265}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<p>We have three primary components when using OAuth \u2013 our client, in this example, ArcGIS Velocity, an authorization server, and a resource server. The authorization server is a key component of OAuth and is responsible for authenticating users and issuing access tokens with proper access policies. It can do this because of the trust it has established with the resource server. The resource server will hold our secured resource, such as an API providing vehicle data access.<\/p>\n<p>The first step of this workflow is for ArcGIS Velocity to request an access token from the authorization server. If this request is made correctly with the parameters the authorization server expects, the authorization server will return a response as shown in the image below. The response includes an access token, a refresh token, the token\u2019s type, and an expiration value that tells us when the access token will expire. Note that refresh tokens are a central part of OAuth but are not required.<\/p>\n"},{"acf_fc_layout":"content","content":"<pre><code style=\"color: #24292e;background: #ffffff;padding: 1em\">{\r\n    \"access_token\": \"08bf97c5r29a77b38eba32455e950f435dxe677\",\r\n    \"token_type\": \"Bearer\",\r\n    \"expires_in\": 3600,\r\n    \"refresh_token\": \"2523f32db4aa52nalp906b2984301e4907b37x\"\r\n}<\/code><\/pre>\n"},{"acf_fc_layout":"content","content":"<p>After ArcGIS Velocity obtains an access token, it can use this access token to request data from the resource server.<\/p>\n<p>ArcGIS Velocity can be configured to utilize the access token\u2019s expiration value and refresh token to send a request to the authorization server\u2019s refresh token endpoint when the access token expires. The refresh token endpoint will provide ArcGIS Velocity with a new access token and refresh token to use in subsequent requests.<\/p>\n<h3><strong>Configuring OAuth in ArcGIS Velocity<\/strong><\/h3>\n<p>OAuth 2.0 authorization is currently available for HTTP endpoints that follow the Client Credentials or Password grant types. Refresh token configuration is available for the HTTP Poller feed type and HTTP output type when configured in real-time analytics. The HTTP Poller data source type does not support refresh token configuration, as the source will only need to get an access token at the beginning of every big data analytic run or only once in a real-time analytic the first time the analytic starts. The HTTP output does not support refresh token configuration when used in a big data analytic for the same reason.<\/p>\n<p>In the explanation below, I\u2019ve opted to utilize the HTTP Poller feed type, as this will allow me to demonstrate the optional refresh token configuration step. I start the configuration process by choosing Create Feed &gt; Web and Messaging &gt; HTTP &gt; HTTP Poller.<\/p>\n<p>On the \u201cConfigure HTTP Poller\u201d page, I will enter the HTTP endpoint used to access data on my resource server for the URL parameter. I\u2019ve chosen GET as the HTTP Method, as my resource server expects a GET request from clients to pull data. For the custom headers parameter, I\u2019ve set a parameter \u201cAuthorization\u201d: \u201cBearer $accessToken,\u201d as my resource server is configured to only return data if the incoming request includes an \u201cAuthorization\u201d header with a valid bearer token as a value.\u00a0Note that $accessToken is a global variable \u2013 ArcGIS Velocity will be able to populate this value and update it as needed based on the configuration we will complete below. Following these changes, I will select \u201cOAuth\u201d under \u201cAuthentication\u201d and then select \u201cConfigure OAuth\u201d. Your resource server may require URL parameters or additional headers, which should be added before preceding.<\/p>\n"},{"acf_fc_layout":"image","image":{"ID":2630282,"id":2630282,"title":"image2","filename":"Untitled-design-6.png","filesize":62363,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-6.png","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity\/untitled-design-6-7","alt":"image showing configure http poller feed type in ArcGIS Velocity.","author":"349902","description":"","caption":"In the Configure HTTP Poller window, a URL endpoint is specified for the resource server, an HTTP Method of GET is chosen, Authentication type is set to OAuth, and a header \u201cAuthorization\u201d:\u201dBearer $accessToken\u201d is set. Optionally, URL parameters, additional headers,  long polling, global variables, and additional logging can be configured.","name":"untitled-design-6-7","status":"inherit","uploaded_to":2629942,"date":"2024-12-17 20:07:23","modified":"2024-12-17 20:08:17","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":826,"height":465,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-6-213x200.png","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-6.png","medium-width":464,"medium-height":261,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-6.png","medium_large-width":768,"medium_large-height":432,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-6.png","large-width":826,"large-height":465,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-6.png","1536x1536-width":826,"1536x1536-height":465,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-6.png","2048x2048-width":826,"2048x2048-height":465,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-6.png","card_image-width":826,"card_image-height":465,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-6.png","wide_image-width":826,"wide_image-height":465}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<p>Next, I am prompted to configure options for requesting an access token. For the access token endpoint parameter, I will enter the HTTP endpoint to request an access token from my authorization server. Your HTTP Method, POST body, URL parameters, and custom headers will depend on the values expected by your access token endpoint. In this case, my authorization server expects a POST request with the expected values in the POST body for \u201cgrant_type\u201d, \u201cusername\u201d, \u201cpassword\u201d, \u201cclient_id\u201d, \u201cclient_secret\u201d, and \u201cscope.\u201d<\/p>\n"},{"acf_fc_layout":"image","image":{"ID":2630322,"id":2630322,"title":"image3","filename":"Untitled-design-7.png","filesize":57311,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-7.png","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity\/untitled-design-7-5","alt":"image of the \"Configure OAuth\" modal in ArcGIS Velocity.","author":"349902","description":"","caption":"On the Configure options for requesting an access token window, the URL for the access token endpoint on the authorization server is set as the access token endpoint, an HTTP Method of POST is selected, and a POST body is configured based on the format expected by the authorization server. Optionally, URL parameters and custom headers can be configured.","name":"untitled-design-7-5","status":"inherit","uploaded_to":2629942,"date":"2024-12-17 20:11:29","modified":"2024-12-17 20:12:16","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":826,"height":465,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-7-213x200.png","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-7.png","medium-width":464,"medium-height":261,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-7.png","medium_large-width":768,"medium_large-height":432,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-7.png","large-width":826,"large-height":465,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-7.png","1536x1536-width":826,"1536x1536-height":465,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-7.png","2048x2048-width":826,"2048x2048-height":465,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-7.png","card_image-width":826,"card_image-height":465,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Untitled-design-7.png","wide_image-width":826,"wide_image-height":465}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<p>When I click \u201cTest\u201d, ArcGIS Velocity will attempt to obtain an access token from the endpoint specified. If this test fails, verifying that you\u2019ve configured the request successfully by attempting the same request outside of ArcGIS Velocity (ex: using Postman or PowerShell) can be helpful. You can also use the Developer Tools in your browser to see if your resource server returned a response or error to this test request.<\/p>\n<p>If this test is successful, ArcGIS Velocity will prompt you to identify which key\/value pair will be used to obtain your access token. In the case below, I will click \u201caccess_token\u201d. As a note, ArcGIS Velocity expects a key\/value pair and does not currently support other formats.<\/p>\n"},{"acf_fc_layout":"image","image":{"ID":2630332,"id":2630332,"title":"Image4","filename":"Image4.png","filesize":40147,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image4.png","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity\/image4-24","alt":"In ArcGIS Velocity, OAuth is being configured.","author":"349902","description":"","caption":"On the Identify fields from a sample access token request window, the access token key\/value is selected. Optionally, users can configure a refresh token and expiration.","name":"image4-24","status":"inherit","uploaded_to":2629942,"date":"2024-12-17 20:13:57","modified":"2024-12-17 20:15:00","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":1495,"height":489,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image4-213x200.png","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image4.png","medium-width":464,"medium-height":152,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image4.png","medium_large-width":768,"medium_large-height":251,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image4.png","large-width":1495,"large-height":489,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image4.png","1536x1536-width":1495,"1536x1536-height":489,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image4.png","2048x2048-width":1495,"2048x2048-height":489,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image4-826x270.png","card_image-width":826,"card_image-height":270,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image4.png","wide_image-width":1495,"wide_image-height":489}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<p>ArcGIS Velocity also provides the option to configure the refresh token and access token expiration from this page, both of which are optional. If a refresh token is specified without an expiration, ArcGIS Velocity will attempt a refresh token request if a data request fails twice in a row. In my case, I\u2019ve chosen \u201crefresh_token\u201d as my refresh token and \u201cexpires_in\u201d as my expiration. My access tokens expire after 3600 seconds, so I\u2019ve selected \u201cduration\u201d and \u201cseconds\u201d for my expiration type. With these options selected, ArcGIS Velocity will automatically use the refresh token endpoint to obtain a new access token from the authorization server when the access token expires.<\/p>\n"},{"acf_fc_layout":"image","image":{"ID":2630392,"id":2630392,"title":"Image5","filename":"Image5.png","filesize":46371,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image5.png","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity\/image5-21","alt":"Sample window of \"Configure OAuth\" in ArcGIS Velocity.","author":"349902","description":"","caption":"When an expiration is set in the Identify fields from a sample access token request window, users can choose a Duration or Timestamp and choose the units from the dropdown to identify the length of time that an access token can be used before it needs to be refreshed.","name":"image5-21","status":"inherit","uploaded_to":2629942,"date":"2024-12-17 20:22:22","modified":"2024-12-17 20:23:14","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":1499,"height":549,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image5-213x200.png","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image5.png","medium-width":464,"medium-height":170,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image5.png","medium_large-width":768,"medium_large-height":281,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image5.png","large-width":1499,"large-height":549,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image5.png","1536x1536-width":1499,"1536x1536-height":549,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image5.png","2048x2048-width":1499,"2048x2048-height":549,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image5-826x303.png","card_image-width":826,"card_image-height":303,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image5.png","wide_image-width":1499,"wide_image-height":549}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<p>If a refresh token was configured in the previous step, we will need to configure a sample request to the refresh token endpoint, which will allow ArcGIS Velocity to obtain a new access token and refresh token. Similarly to the access token endpoint, I will enter the HTTP endpoint to request a refresh token from my authorization server for the refresh token endpoint parameter. Your Method, POST body, URL parameters, and Custom headers will depend on the values expected by your refresh token endpoint. In my case, my authorization server expects a POST request with the expected values in the POST body for \u201cgrant_type\u201d, \u201crefresh_token\u201d, \u201cclient_id\u201d, \u201cclient_secret\u201d, and \u201cscope.\u201d<\/p>\n<p>My refresh token endpoint requires that I provide my refresh token value in the POST body to obtain a new access token. In the refresh token request, ArcGIS Velocity supports both the $refreshToken and $accessToken global variables in the POST body, URL parameters, and custom headers, as the expected format and location of these global variables will depend on the authorization server configuration.<\/p>\n"},{"acf_fc_layout":"image","image":{"ID":2630382,"id":2630382,"title":"Image6","filename":"Image6.png","filesize":69794,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image6.png","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity\/image6-19","alt":"\"Configure OAuth\" modal in ArcGIS Velocity.","author":"349902","description":"","caption":"On the Configure options for requesting a refresh token window, the HTTP endpoint for requesting a refresh token from the authorization server is set as the refresh token endpoint,  an HTTP Method of POST is selected, and a POST body is configured based on the configuration expected by the authorization server. Optionally, URL parameters and custom headers can be configured.","name":"image6-19","status":"inherit","uploaded_to":2629942,"date":"2024-12-17 20:21:12","modified":"2024-12-17 20:22:05","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":1350,"height":803,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image6-213x200.png","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image6.png","medium-width":439,"medium-height":261,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image6.png","medium_large-width":768,"medium_large-height":457,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image6.png","large-width":1350,"large-height":803,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image6.png","1536x1536-width":1350,"1536x1536-height":803,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image6.png","2048x2048-width":1350,"2048x2048-height":803,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image6-782x465.png","card_image-width":782,"card_image-height":465,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image6.png","wide_image-width":1350,"wide_image-height":803}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<p>When I click \u201cTest\u201d, ArcGIS Velocity will attempt to obtain a refresh token from the endpoint specified. Similarly to the access token sample request, Postman, PowerShell, and your browser\u2019s Developer tools can help troubleshoot unsuccessful connections. If this test is successful, ArcGIS Velocity will prompt you to identify which key\/value pair will be used to obtain your access token and refresh token, similar to the workflow we followed above for the access token configuration. In my case, I\u2019ve chosen \u201caccess_token\u201d and \u201crefresh_token.\u201d<\/p>\n"},{"acf_fc_layout":"image","image":{"ID":2630402,"id":2630402,"title":"Image7","filename":"Image7.png","filesize":45778,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image7.png","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity\/image7-14","alt":"In the Identify fields from a sample refresh token request window, the access token and refresh token key\/value pairs are identified.","author":"349902","description":"","caption":"In the Identify fields from a sample refresh token request window, the access token and refresh token key\/value pairs are identified.","name":"image7-14","status":"inherit","uploaded_to":2629942,"date":"2024-12-17 20:24:03","modified":"2024-12-17 20:24:19","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":1499,"height":446,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image7-213x200.png","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image7.png","medium-width":464,"medium-height":138,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image7.png","medium_large-width":768,"medium_large-height":229,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image7.png","large-width":1499,"large-height":446,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image7.png","1536x1536-width":1499,"1536x1536-height":446,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image7.png","2048x2048-width":1499,"2048x2048-height":446,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image7-826x246.png","card_image-width":826,"card_image-height":246,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image7.png","wide_image-width":1499,"wide_image-height":446}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<p>Following this, we are brought back to the \u201cConfigure HTTP Poller\u201d page. When we click \u201cNext\u201d, ArcGIS Velocity will attempt a test connection call to your resource server using an access token from your authorization server. We can configure our schema, key fields, and feed polling interval as we would for any other HTTP Poller feed.<\/p>\n<p>As a helpful note, the HTTP Poller feed and HTTP output include the option to \u201cEnable Request Logging\u201d. If a feed or output that uses OAuth is not working as expected, this property can be enabled to assist with troubleshooting. When this parameter is enabled, all access token, refresh token, and data requests will be logged in ArcGIS Velocity\u2019s logs. If data is not being ingested or written as expected, view the responses from the access token, refresh token, and data requests to help identify if changes need to be made to your OAuth workflow. This property should only be enabled for troubleshooting purposes and disabled when troubleshooting is complete.<\/p>\n"},{"acf_fc_layout":"image","image":{"ID":2630412,"id":2630412,"title":"Image8","filename":"Image8.png","filesize":92303,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image8.png","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity\/image8-11","alt":"Image of the Configure HTTP Poller window","author":"349902","description":"","caption":"Once OAuth is configured, the Configure HTTP Poller window will open. This window provides an optional \"Enable Request Logging\" parameter, which will log all access token, refresh token, and data requests to assist with troubleshooting.","name":"image8-11","status":"inherit","uploaded_to":2629942,"date":"2024-12-17 20:24:54","modified":"2024-12-17 20:25:28","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":1345,"height":944,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image8-213x200.png","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image8.png","medium-width":372,"medium-height":261,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image8.png","medium_large-width":768,"medium_large-height":539,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image8.png","large-width":1345,"large-height":944,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image8.png","1536x1536-width":1345,"1536x1536-height":944,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image8.png","2048x2048-width":1345,"2048x2048-height":944,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image8-663x465.png","card_image-width":663,"card_image-height":465,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/Image8.png","wide_image-width":1345,"wide_image-height":944}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<h3><strong>Conclusion<\/strong><\/h3>\n<p>We can now successfully configure an HTTP Poller feed, data source, or HTTP output using the OAuth authorization, allowing us to utilize HTTP endpoints secured with OAuth 2.0 in our analytics in ArcGIS Velocity. Using the configuration outlined above, ArcGIS Velocity can successfully obtain access tokens and refresh those tokens as necessary, all without any manual user interaction, and utilize these tokens to access secured data. As OAuth is\u00a0one of the most widely used authorization frameworks, this capability opens the door to utilizing these secured endpoints to support our GIS workflows.<\/p>\n<p>Explore more on real-time GIS, visit the <a href=\"https:\/\/www.esri.com\/en-us\/arcgis\/products\/arcgis-velocity\/overview\">ArcGIS Velocity page here<\/a>.<\/p>\n"}],"related_articles":"","show_article_image":false,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/InfoSec_826x465.jpg","wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/InfoSec_1920x1080.jpg"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Enhancing Data Security with OAuth in ArcGIS Velocity<\/title>\n<meta name=\"description\" content=\"Learn how to enhance data security with OAuth in ArcGIS Velocity. Protect sensitive data and manage permissions efficiently.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enhancing Data Security: A Comprehensive Guide to OAuth in ArcGIS Velocity\" \/>\n<meta property=\"og:description\" content=\"Learn how to enhance data security in ArcGIS Velocity with OAuth. Discover the benefits of using this open standard authorization framework.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity\" \/>\n<meta property=\"og:site_name\" content=\"ArcGIS Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/esrigis\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-18T20:21:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.esri.com\/arcgis-blog\/wp-content\/uploads\/2024\/12\/InfoSec_826x465.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"826\" \/>\n\t<meta property=\"og:image:height\" content=\"465\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Enhancing Data Security: A Guide to Implementing OAuth in ArcGIS Velocity\" \/>\n<meta name=\"twitter:site\" content=\"@ESRI\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity\"},\"author\":{\"name\":\"Nicole Phaneuf\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/3f983dcf3d7eb81f0f89f902419a1fdd\"},\"headline\":\"Enhancing Data Security: A Guide to Implementing OAuth in ArcGIS Velocity\",\"datePublished\":\"2024-12-17T22:01:12+00:00\",\"dateModified\":\"2024-12-18T20:21:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity\"},\"wordCount\":11,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#organization\"},\"keywords\":[\"ArcGIS Velocity\",\"OAuth\",\"Real-Time GIS\"],\"articleSection\":[\"Real-Time Visualization &amp; Analytics\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity\",\"name\":\"Enhancing Data Security with OAuth in ArcGIS Velocity\",\"isPartOf\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#website\"},\"datePublished\":\"2024-12-17T22:01:12+00:00\",\"dateModified\":\"2024-12-18T20:21:18+00:00\",\"description\":\"Learn how to enhance data security with OAuth in ArcGIS Velocity. Protect sensitive data and manage permissions efficiently.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esri.com\/arcgis-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enhancing Data Security: A Guide to Implementing OAuth in ArcGIS Velocity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#website\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/\",\"name\":\"ArcGIS Blog\",\"description\":\"Get insider info from Esri product teams\",\"publisher\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esri.com\/arcgis-blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#organization\",\"name\":\"Esri\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png\",\"contentUrl\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png\",\"width\":400,\"height\":400,\"caption\":\"Esri\"},\"image\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/esrigis\/\",\"https:\/\/x.com\/ESRI\",\"https:\/\/www.linkedin.com\/company\/5311\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/3f983dcf3d7eb81f0f89f902419a1fdd\",\"name\":\"Nicole Phaneuf\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4b328063dbc4d7175ec1e621407724b7f2ac2b47154a8f038ea780d8905e22c5?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4b328063dbc4d7175ec1e621407724b7f2ac2b47154a8f038ea780d8905e22c5?s=96&d=blank&r=g\",\"caption\":\"Nicole Phaneuf\"},\"url\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Enhancing Data Security with OAuth in ArcGIS Velocity","description":"Learn how to enhance data security with OAuth in ArcGIS Velocity. Protect sensitive data and manage permissions efficiently.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity","og_locale":"en_US","og_type":"article","og_title":"Enhancing Data Security: A Comprehensive Guide to OAuth in ArcGIS Velocity","og_description":"Learn how to enhance data security in ArcGIS Velocity with OAuth. Discover the benefits of using this open standard authorization framework.","og_url":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity","og_site_name":"ArcGIS Blog","article_publisher":"https:\/\/www.facebook.com\/esrigis\/","article_modified_time":"2024-12-18T20:21:18+00:00","og_image":[{"width":826,"height":465,"url":"https:\/\/www.esri.com\/arcgis-blog\/wp-content\/uploads\/2024\/12\/InfoSec_826x465.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Enhancing Data Security: A Guide to Implementing OAuth in ArcGIS Velocity","twitter_site":"@ESRI","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity#article","isPartOf":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity"},"author":{"name":"Nicole Phaneuf","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/3f983dcf3d7eb81f0f89f902419a1fdd"},"headline":"Enhancing Data Security: A Guide to Implementing OAuth in ArcGIS Velocity","datePublished":"2024-12-17T22:01:12+00:00","dateModified":"2024-12-18T20:21:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity"},"wordCount":11,"commentCount":0,"publisher":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#organization"},"keywords":["ArcGIS Velocity","OAuth","Real-Time GIS"],"articleSection":["Real-Time Visualization &amp; Analytics"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity","url":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity","name":"Enhancing Data Security with OAuth in ArcGIS Velocity","isPartOf":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#website"},"datePublished":"2024-12-17T22:01:12+00:00","dateModified":"2024-12-18T20:21:18+00:00","description":"Learn how to enhance data security with OAuth in ArcGIS Velocity. Protect sensitive data and manage permissions efficiently.","breadcrumb":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-velocity\/real-time\/enhancing-data-security-a-guide-to-implementing-oauth-in-arcgis-velocity#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esri.com\/arcgis-blog\/"},{"@type":"ListItem","position":2,"name":"Enhancing Data Security: A Guide to Implementing OAuth in ArcGIS Velocity"}]},{"@type":"WebSite","@id":"https:\/\/www.esri.com\/arcgis-blog\/#website","url":"https:\/\/www.esri.com\/arcgis-blog\/","name":"ArcGIS Blog","description":"Get insider info from Esri product teams","publisher":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esri.com\/arcgis-blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esri.com\/arcgis-blog\/#organization","name":"Esri","url":"https:\/\/www.esri.com\/arcgis-blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png","contentUrl":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png","width":400,"height":400,"caption":"Esri"},"image":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/esrigis\/","https:\/\/x.com\/ESRI","https:\/\/www.linkedin.com\/company\/5311\/"]},{"@type":"Person","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/3f983dcf3d7eb81f0f89f902419a1fdd","name":"Nicole Phaneuf","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4b328063dbc4d7175ec1e621407724b7f2ac2b47154a8f038ea780d8905e22c5?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4b328063dbc4d7175ec1e621407724b7f2ac2b47154a8f038ea780d8905e22c5?s=96&d=blank&r=g","caption":"Nicole Phaneuf"},"url":""}]}},"text_date":"December 17, 2024","author_name":"Nicole Phaneuf","author_page":false,"custom_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/InfoSec_1920x1080.jpg","primary_product":"ArcGIS Velocity","tag_data":[{"term_id":756721,"name":"ArcGIS Velocity","slug":"arcgis-velocity","term_group":0,"term_taxonomy_id":756721,"taxonomy":"post_tag","description":"","parent":0,"count":42,"filter":"raw"},{"term_id":777722,"name":"OAuth","slug":"oauth","term_group":0,"term_taxonomy_id":777722,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw"},{"term_id":407602,"name":"Real-Time GIS","slug":"real-time-gis","term_group":0,"term_taxonomy_id":407602,"taxonomy":"post_tag","description":"","parent":0,"count":22,"filter":"raw"}],"category_data":[{"term_id":37121,"name":"Real-Time Visualization &amp; Analytics","slug":"real-time","term_group":0,"term_taxonomy_id":37121,"taxonomy":"category","description":"","parent":0,"count":166,"filter":"raw"}],"product_data":[{"term_id":756702,"name":"ArcGIS Velocity","slug":"arcgis-velocity","term_group":0,"term_taxonomy_id":756702,"taxonomy":"product","description":"","parent":36981,"count":61,"filter":"raw"}],"primary_product_link":"https:\/\/www.esri.com\/arcgis-blog\/?s=#&products=arcgis-velocity","_links":{"self":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/blog\/2629942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/users\/366152"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/comments?post=2629942"}],"version-history":[{"count":0,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/blog\/2629942\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/media?parent=2629942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/categories?post=2629942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/tags?post=2629942"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/industry?post=2629942"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/product?post=2629942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}