Skip To Content

Scan your portal for security best practices

The ArcGIS Enterprise portal comes with a Python script tool,, that scans for some common security issues. The tool checks for problems based on some of the best practices for configuring a secure environment for your portal. It analyzes many criteria or configuration properties and divides them into three severity levels: Critical, Important, and Recommended. The descriptions of these criteria are as follows:




Proxy restrictions

Determines if the portal proxy capability is restricted. By default, the portal proxy server is open to any URL. To mitigate against potential Denial of Service (DoS) or Server Side Request Forgery (SSRF) attacks, it's strongly recommended that you restrict the portal's proxy capability to approved web addresses.



Token requests

Determines if generate token requests with credentials in the query parameter are supported. If supported, when generating tokens, a user's credentials could be provided as part of the URL and may be exposed through browser history or in network logs. This should be disabled unless required by other applications.



Portal services directory

Determines if the portal services directory is accessible through a web browser. This should be disabled to reduce the chances that your portal items, services, web maps, groups, and other resources can be browsed, found in a web search, or queried through HTML forms.



Secure communication

Determines if the portal communicates through HTTPS only. To prevent the interception of any communication within the portal, it's recommended that you configure your portal and the web server hosting the Web Adaptor to enforce SSL.



Built-in account sign-up

Determines if users can click the Create An Account button on the portal sign-up page to create a built-in portal account. If you're using enterprise accounts or you want to create all accounts manually, disable this option.



Anonymous access

Determines if anonymous access is allowed. To prevent any user from accessing content without first providing credentials to the portal, it's recommended that you configure your portal to disable anonymous access.



LDAP identity store

If the portal is configured with an LDAP identity store, this determines if encrypted communication is used. It is recommended to use LDAPS in the ldapURLForUsers and ldapURLForRoles properties listed in the user store and group store configuration parameters.



Portal SSL certificate

Determines if a self-signed certificate is used by portal. To help reduce web browser warnings or other unexpected behavior from clients communicating with the portal, it is recommended to import and use a CA-signed SSL certificate bound to port 7443.



Cross-domain requests

Determines if cross-domain (CORS) requests are unrestricted. To reduce the possibility of an unknown application accessing a shared portal item, it is recommended to restrict cross-domain requests to applications hosted only in trusted domains.



Federated server administrative URL

Determines if your federated server's administrator URL is reachable by portal and if the SSL certificate used in this URL is trusted. If untrusted or not reachable, many portal functions and operations will fail.



Federated server services URL

Determines if your federated server's services URL is reachable by portal and if the SSL certificate used in this URL is trusted. If untrusted or not reachable, the portal will still function but some portal operations may fail.



Public content

If the portal is configured so members cannot share content publicly, this will list any items that are still shared with Everyone.

The script is located in the <Portal for ArcGIS installation location>\tools\security directory. Run the script from the command line or shell. You have the option to specify one or more parameters when running the script. parameters



The fully-qualified domain name of the machine where Portal is installed (i.e.: The default is the hostname of the machine where the script is run.


The username of an administrator account.


The password of an administrator account.


The directory where the security scan report will be saved. The default directory is the same folder where you run the script.


A token can be generated and used in place of the username and password. When generating a token, the fully-qualified domain name of the Portal being scanned should be input in the 'Webapp URL' field. When a token is provided, it overrides any username or password that is provided.


Disable SSL certificate verification. Starting in 10.7.1, the script will attempt to verify all SSL certificates by default. If Python does not trust the issuer of the certificates, the script will fail to complete. If needed, this parameter can be specified to ignore all certificates.

-h or -?

Outputs a listing of the parameters that can be specified when running the script.

Example: python -n -u admin -p my.password -o C:\Temp

If the script is run without specifying any parameters, you will be prompted to enter them manually or select the default value. If you wish to use a token, it must be provided as a parameter when running the script.

The scan generates a report in HTML format that lists any of the above issues that were found in the specified portal.

By default, the report is saved in the same folder where you run the script and is named portalScanReport_[hostname]_[date].html.

In this topic
  1. parameters