Version 26 (modified by mdumitru, 20 months ago) (diff)


Downloading rasdaman

There are several ways to get rasdaman - installing from source, installing prefabricated RPM packages, or downloading a preconfectioned Virtual Machine.

This is the download location for rasdaman community; for rasdaman enterprise (what's the difference?) contact rasdaman GmbH.

Alternative 1: Source Code

Download and compile rasdaman. This is the most flexible alternative, but requires some system management skills. Installer Use our new installer that will guide you through the process of installing from source.

Alternative 2: RPM packages

Get preconfectioned packages for installation on CentOS; this requires only superficial administration knowledge.

Alternative 3: DEB packages

Get preconfectioned packages for installation on Debian / Ubuntu; this requires only superficial administration knowledge.

Alternative 4: Virtual Machine

By downloading a Virtual Machine (VM) you get a fully configured system with rasdaman installed and ready to run. This alternative does not require any system administration skills other than starting the VM and working with the rasdaman services, e.g., via the OGC standards based geo service interface.


There are several security measures available, which should be considered seriously. Among them are the access right mechanisms found in Tomcat, web server, rasdaman, and PostgreSQL. We highly recommend to make use of these.

For Tomcat, Web server, and PostgreSQL we refer to the pertaining documentation. For rasdaman, we recommend to change the default user passwords in rasdaman (rasguest/rasguest for read-only access, rasadmin/rasadmin for read-write and administrator access) to not run into the Oracle "Scott/tiger" trap. Even better, add separate, private users. For all these actions, the rascontrol utility is your friend (cf. installation guide). Along the same line we recommend to configure petascope access to rasdaman using a read-only login which is different from the default one provided in the file.

The servlet is safe against SQL injection attacks - we are not aware of any means for the user to send custom queries to the PostgreSQL server or the rasdaman server. XSRF and XSS represent no danger to the service because there is no user generated content available.

The rasdaman service doesn't use cookies.

Next Steps

Once the rasdaman service is up and running you may be interested in clients available.

Also, find additional information in documentation, FAQ, and known issues.