Chapter 5

Planning the Security Architecture

TOPICS COVERED IN THIS CHAPTER

  • Planning Authentication Methods
  • Planning for Secure Sites
  • Designing Authorization
  • Planning Web Application Security
  • Planning Code Access Security

The simplest way to deploy SharePoint Server 2010, or any other content-management and collaboration system, would be to give all users access to all information. However, in the real world of modern organizations, such a security plan is simply not sufficient. To securely implement SharePoint Server 2010, you must understand the authentication and authorization capabilities of the system.

In this chapter, you will learn about the authentication methods available for access to SharePoint Server 2010 sites and the process ...

Get Microsoft® SharePoint® 2010 Administration: Real-World Skills for MCITP Certification and Beyond now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.