Download presentation
Presentation is loading. Please wait.
Published byCecily Sutton Modified over 9 years ago
2
About Chris Welch Synergy – Global Reach. Local Service. Email - cwelch@synergyonline.com Cell - 808 255 9431 Online - www.synergyonline.com USA | South Africa | United Kingdom | Asia Pacific
3
SharePoint 2010 End User Security - Standardization and Customization Understanding security in the End User environment Discussion and Demonstrations All participation is welcome and appreciated
4
SharePoint 2010 End User Security - Standardization and Customization > Planning and understanding < How do you make a meaningful security infrastructure? So… Let’s talk a bit about security
5
What is security? Trust Trust in people Trust in technology Trust in business P&P Trust in the institutional setting
6
Best Practice Keep it simple Reduce Reuse Recycle Security is a management process
7
Basic Security Concepts Plan the security environment Plan the security environment What – define security What – define security Sites Sites Lists and libraries Lists and libraries Who – define roles Who – define roles Separation of Duties Separation of Duties Access – define levels Access – define levels Least Privilege Least Privilege
8
SharePoint Roles Standard Security Roles Standard Security Roles Farm Administrator Farm Administrator Site Collection Administrator Site Collection Administrator Service Application Administrator Service Application Administrator Site Administrator Site Administrator Users Users
9
Security 101 - Terms Authorization vs. Authentication Authorization vs. Authentication Risk Management Risk Management $ or other measure $ or other measure Central tenets of measuring secure systems Central tenets of measuring secure systems Confidentiality Confidentiality Integrity Integrity Availability Availability Non Repudiation Non Repudiation Others…. Others….
10
So What About SharePoint? Demo Interlude Demo Interlude How does SharePoint do - How does SharePoint do - Confidentiality Confidentiality Integrity Integrity Availability Availability Non-Repudiation Non-Repudiation
11
Discussion Point Where are the Where are the Strengths in your SharePoint security Strengths in your SharePoint security Weaknesses in your SharePoint security Weaknesses in your SharePoint security What is the trust factor
12
Architecture Primer SharePoint architecture SharePoint architecture Web Application Site Collection Sites Lists and Libraries
13
Web Application Security Performed by a Farm Administrator Performed by a Farm Administrator Security Security Authentication Authentication User Permissions User Permissions Policies Policies Anonymous Anonymous User User Permissions Permissions
14
Web Application Demo Authentication Providers Authentication Providers User Permissions User Permissions Remove Manage Lists permission Remove Manage Lists permission Policies Policies Create Deny Delete Permission Policy Create Deny Delete Permission Policy Apply as a User Policy Apply as a User Policy
15
Site Collection Administrator Site Collection Administrator Has full control of all content in a site collection Has full control of all content in a site collection Is bound by security policy settings at the Web Application level Is bound by security policy settings at the Web Application level Is managed at the site collection or farm Web Application level Is managed at the site collection or farm Web Application level Highly trusted position in user environment Highly trusted position in user environment Farm Administrator Farm Administrator Site collection security
16
Site Level Security Uses three basic pieces of infrastructure Uses three basic pieces of infrastructure Security principle Security principle Securable Object Securable Object Permission Level Permission Level User or GroupSite-List-Item Permission Level
17
Users and Groups Maintained at the site collection Maintained at the site collection Users Users Available from Authentication Provider Available from Authentication Provider Stored in user information list Stored in user information list Groups Groups AD AD SharePoint SharePoint Best Practice Discussion Best Practice Discussion Users vs. Groups Users vs. Groups
18
Some Limits to Consider Supported Limits Supported Limits Groups per users - 5000 Groups per users - 5000 Users – 2 million per SC Users – 2 million per SC Principles per group – 5000 Principles per group – 5000 SharePoint Groups – 10,000 per SC SharePoint Groups – 10,000 per SC Security Scope – 5000 Security Scope – 5000 Limits based on performance Limits based on performance
19
Users and Group Demo Users and Group Users and Group Review groups Review groups Create a group and discuss settings Create a group and discuss settings Suggestions Group Suggestions Group Add users Add users Settings overview Settings overview Groups page Groups page Group Group
20
Securable Objects Sites, lists and libraries, item Sites, lists and libraries, item Security inherited by default Security inherited by default Inheritance can be removed Inheritance can be removed Sites can be created with unique permissions Sites can be created with unique permissions Creates three groups by default Creates three groups by default Permsetup.aspx Permsetup.aspx
21
Securable Objects Demonstration Review settings Review settings Remove inheritance for a site Remove inheritance for a site Remove inherited principles Remove inherited principles Create a new security infrastructure Create a new security infrastructure
22
Permissions and Permission Levels Used to grant access Used to grant access Based upon granular permissions Based upon granular permissions 33 33 Default set of permission levels Default set of permission levels FDCRL FDCRL AMRV AMRV Do not delete! Do not delete! Used to create customized security settings Used to create customized security settings
23
Permission Levels Stored at the top level site Stored at the top level site Inheritance can be broken, using PowerShell Inheritance can be broken, using PowerShell Best practice is to create a new Permission Level by inheriting from an existing one Best practice is to create a new Permission Level by inheriting from an existing one
24
Demo of Permission Levels Review permissions Review permissions Create a permission level by copying Create a permission level by copying Remove delete versions Remove delete versions Create a manage lists permission level Create a manage lists permission level Demonstrate permission dependencies Demonstrate permission dependencies
25
Finally Security Security Standardize where possible Standardize where possible Customize where necessary Customize where necessary Plan Plan Document Document Simplify Simplify
26
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.