Skip To Content

Configure security settings

As an administrator of your organization, you determine whether HTTPS is required for all transactions and whether anonymous access is allowed to your portal. You can also configure trusted servers and configure a list of portals with which you want to share secure content. This is a privilege reserved for the administrator role.

  1. Verify that you are signed in as an administrator of your organization.
  2. Click Organization at the top of the site and click Edit Settings.
  3. Click Security on the left side of the page.
  4. Configure any of the security settings. For more information, see Policies, Password policy, Enterprise logins, Sign in options, Trusted servers, and Allow portal access.
  5. Click Save to save the changes you've made.


Change any of the following policy settings as needed:

  • Allow access to the organization through HTTPS onlyCheck this box to ensure that your organization's data as well as any temporary identification tokens that allow access to your data are encrypted during communications over the Internet. Turning on HTTPS may affect the performance of the site.

  • Allow anonymous access to your organization—Keep this box checked to allow anonymous users access to your organization's website. If this box is unchecked, anonymous users will not be able to access the website. They will also not be able to view your maps with Bing Maps (if your organization is configured for Bing Maps). If you enable anonymous access (by checking the box), make sure that the groups selected for the site configuration groups are shared with the public; otherwise, anonymous users may not be able to properly view or access the public content of those groups.

  • Allow members to edit biographical information and who can see their profile—Keep this box checked to allow members to modify the biographical information in their profile and specify who can see their profile.
  • Allow users to create new built-in accounts—Keep this box checked to allow users to create a built-in portal account from the portal sign-in page. Uncheck it if you are using enterprise accounts or want to create all accounts manually.

Password policy

When members change their passwords, they must conform to the organization's policy. If they don't, a message appears with the policy details. The password policy of the organization does not apply to enterprise logins or app credentials that use app IDs and app secrets.

Click Update Password Policy to configure the password length, complexity, and history requirements for members with built-in accounts. Click Use Default Portal Policy to reset the organization to use the standard Portal for ArcGIS password policy (at least eight characters with at least one letter and one number; spaces are not allowed).

You can specify the character length and whether the password must contain at least one of any of the following: uppercase letter, lowercase letter, number, or special character. You can also configure the number of days before the password expires and the number of past passwords that the member cannot reuse. Passwords are case sensitive and cannot be the same as the user name.

Enterprise logins

Use the Set Identity Provider and Get Service Provider buttons to Configure a SAML-compliant identity provider with your portal if you want members to sign in to the portal using the same logins they use to access your enterprise information systems.

Sign in options

If you configured a SAML-compliant identity provider with your portal, you see a Sign In Options section where you can configure the options that appear on the portal sign in page. Click the button next to Either their (idphost) or Portal for ArcGIS account or Their (idphost) account only. For example, if you want all members to sign in only with their login for the SAML-compliant identity provider, click the second button. Otherwise, click the first button to make both options for logging in to the portal available on the portal sign in page.

Trusted servers

For Trusted Servers, configure the list of trusted servers you want your clients to send credentials to when making Cross-Origin Resource Sharing (CORS) requests to access services secured with web-tier authentication. This applies primarily to editing secure feature services from a stand-alone (unfederated) ArcGIS Server or viewing secure OGC services. ArcGIS Server hosting services secured with token-based security do not need to be added to this list. Servers added to the trusted servers list must support CORS. Layers hosted on servers without CORS support may not function as expected. ArcGIS Server supports CORS by default at versions 10.1 and later. To configure CORS on non-ArcGIS servers, refer to the vendor documentation for the web server.

The host names must be entered individually. Wildcards cannot be used and are not accepted. The host name can be entered with or without the protocol in front of it. For example, the host name can be entered as or


Editing feature services secured with web-tier authentication requires a web browser enabled with CORS. The latest versions of Firefox, Chrome, Safari, and Internet Explorer are CORS enabled. To test if your browser has CORS enabled, open

Allow portal access

Configure a list of portals (for example with which you want to share secure content. This will allow members of your organization to use their enterprise logins (including SAML logins) to access the secure content when viewing it from these portals. Portals that your organization collaborates with will be included automatically and will not need to be added to this list. This is only applicable for portals at Portal for ArcGIS version 10.5 and later. This setting is not needed for sharing secured content with an ArcGIS Online organization.

The portal URLs must be entered individually and must include the protocol. Wildcards cannot be used and are not accepted. If the portal being added allows both HTTP and HTTPS access, two URLs need to be added for that portal (for example and Any portal added to the list is validated first and, therefore, must be accessible from the browser.