Authentication Profiles
Authentication Profiles define how map services (ArcGIS, Azure Maps, Maptaskr tiles) are authorized and accessed within your Maptaskr Power Maps implementation. These profiles handle the secure connection between your application and external map service providers.
What Authentication Profiles Do
Authentication profiles manage several critical aspects of service integration:
- Credential Storage: Securely store API keys, client secrets, and authentication tokens
 - Token Management: Automatically handle token exchange, refresh cycles, and expiration
 - Request Configuration: Define headers, URL parameters, and request formatting
 - Service Access: Control which endpoints and features your application can access
 - Security Enforcement: Implement proper authentication flows for different service types
 
When you install a provider, default profiles are auto-generated so you can begin testing immediately. These can be customized with your own credentials for production use.
Understanding the Interface
Authentication profiles are configured using a two-tab interface:
- Auth Details Tab: Configure basic authentication (API keys, headers, URL parameters)
 - Auth Request Details Tab: Configure OAuth flows and advanced authentication
 
ArcGIS profiles are grouped into Enterprise (on-premises/self-hosted) and Online (hosted SaaS). Azure and Maptaskr ship with simplified key/tile profiles respectively.
- ArcGIS credentials: Get your API Key and Client ID/Secret from ArcGIS Developers
 - Azure credentials: Obtain your subscription key from Azure Portal
 
Default Profiles by Provider
When all providers are installed, you'll see these built-in profiles that can be customized:
| Provider | Profile Name | Configuration Method | Best For | 
|---|---|---|---|
| ArcGIS Online | API Key | Auth Details → URL Parameters | Public services, quick setup | 
| ArcGIS Online | Client ID/Secret | Auth Request Details → OAuth | Secure server-to-server | 
| ArcGIS Online | Username/Password | Auth Request Details → Interactive | User-scoped content | 
| ArcGIS Enterprise | Client ID/Secret | Auth Request Details → OAuth | Private on-premises services | 
| ArcGIS Enterprise | Username/Password | Auth Request Details → Session | Legacy or admin access | 
| Azure Maps | Azure Map | Auth Details → URL Parameters | All Azure Maps services | 
| Maptaskr Tile Auth | Maptaskr Tile | Internal | no config needed | 
| Maptaskr AI Auth | Maptaskr AI | Internal | no config needed | 
Configuration Guide by Authentication Type
Simple API Key Authentication
Use the Auth Details tab for straightforward API key authentication:
For URL Parameters (most common):
- 
Navigate to Auth Details tab
 - 
Click Add Parameter
 - 
Configure the parameter:
- Name: 
token(ArcGIS) orsubscription-key(Azure) - Value: Your actual API key
 
 - Name: 
 - 
Click Save
 
For Header-based APIs:
- 
Navigate to Auth Details tab
 - 
Click Add Header
 - 
Configure the header:
- Name: 
X-API-KeyorAuthorization - Value: Your API key or 
Bearer your_token 
 - Name: 
 - 
Click Save
 
OAuth Client Credentials
Use the Auth Request Details tab for OAuth authentication:
- 
Navigate to Auth Request Details tab
 - 
Check Has Auth Request
 - 
Configure the OAuth settings:
- Auth Request URL: Your OAuth token endpoint
 - Method: Usually 
POST - Auth Request Headers: Content-Type, etc.
 - Auth Request Body: Client credentials
 - Token needs refreshing every: Set refresh interval
 
 - 
Check Can be used offline if needed
 - 
Click Save
 
The platform automatically handles token refresh and injection. Don't manually modify token parameters in your requests.
Interactive Username/Password
For services requiring user authentication:
- 
Navigate to Auth Request Details tab
 - 
Check Has Auth Request
 - 
Configure authentication endpoint
 - 
Use Test Provider to capture credentials securely
 - 
Credentials are not stored - captured interactively when needed
 
Avoid storing named user credentials long-term. Migrate to client credential flows where license terms permit.
Common Configuration Examples
ArcGIS Online with API Key
Configuration: Auth Details → Additional URL Parameters
Parameter Name: token
Parameter Value: your_arcgis_api_key
Azure Maps
Configuration: Auth Details → Additional URL Parameters
Parameter Name: subscription-key
Parameter Value: your_azure_subscription_key
Custom API with Header Authentication
Configuration: Auth Details → Additional Request Headers
Header Name: X-API-Key
Header Value: your_custom_api_key
ArcGIS Enterprise OAuth
Configuration: Auth Request Details
- Has Auth Request: Checked
 - Auth Request URL: 
https://your-portal.com/portal/sharing/rest/oauth2/token - Method: POST
 - Auth Request Body: Client ID and Secret configuration
 - Token refresh interval: 60 minutes
 
Profile Management
Creating New Profiles
- 
Navigate to Configuration → Auth Manager → Advanced
 - 
Click "Add New Profile"
 - 
Enter a descriptive profile name
 - 
Configure authentication using the appropriate tab
 - 
Save your changes
 
Security Best Practices
| Area | Recommendation | Implementation | 
|---|---|---|
| Credential Scope | Use keys scoped only to required services | Review API key permissions in provider portals | 
| Regular Rotation | Rotate secrets/keys every 90 days | Set calendar reminders for key rotation | 
| Environment Separation | Use different credentials for dev/staging/prod | Create separate profiles for each environment | 
| Monitoring | Track failed authentication attempts | Review logs for unusual authentication patterns | 
| OAuth Preference | Use OAuth over username/password where possible | Migrate legacy username/password profiles | 
| Secure Storage | Never store secrets in notes or unrelated fields | Use only designated credential fields | 
Common Validation Errors
When configuring profiles, you may encounter these validation messages:
| Error Message | Cause | Solution | 
|---|---|---|
| "Key and value pairs cannot be empty" | Empty header or parameter fields | Fill in both Name and Value, or delete the row | 
| "Auth Request URL is required" | "Has Auth Request" checked but no URL | Enter the OAuth endpoint URL or uncheck the option | 
| "Auth Profile Name" required | Missing profile name | Enter a descriptive profile name | 
Troubleshooting Authentication Issues
| Problem | Likely Cause | Resolution | 
|---|---|---|
| 401 Unauthorized errors | Expired or invalid credentials | Rotate keys in provider portal and update profile | 
| Services intermittently fail | Network timeouts or rate limits | Check network connectivity and API usage limits | 
| Username prompt appears repeatedly | Session not persisting | Enable pop-ups in browser or switch to Client ID/Secret | 
Summary
Well-configured authentication profiles ensure stable, secure, and performant map service integration across all environments. Key takeaways:
- Use the correct tab: Auth Details for simple keys, Auth Request Details for OAuth
 - Separate environments: Create dedicated profiles for dev, staging, and production
 - Monitor and rotate: Regularly update credentials and monitor for issues
 - Follow security best practices: Use least-privilege access and OAuth where possible