Understand the Various Forms of Authentication

Fundamentally, any application platform will use one of two models for authentication: trusted subsystem or impersonation/delegation.

A trusted subsystem is a service that will validate the credentials of the end user but, from that point forward, access all of the resources using a service account identity. This type of model allows you to perform actions like connection pooling and caching. If you look at Application Pools in IIS, the trusted subsystem model allows you to use a service account without storing the credentials in a plain-text file, thus compromising your accounts. Ultimately, SharePoint serves as a trusted subsystem using Windows credentials. This is evident when you have to grant ...

Get Automating Microsoft® SharePoint® 2010 Administration with Windows PowerShell® 2.0 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.