Chapter 5
Planning the Security Architecture
TOPICS COVERED IN THIS CHAPTER
- Planning Authentication Methods
- Planning for Secure Sites
- Designing Authorization
- Planning Web Application Security
- Planning Code Access Security
The simplest way to deploy SharePoint Server 2010, or any other content-management and collaboration system, would be to give all users access to all information. However, in the real world of modern organizations, such a security plan is simply not sufficient. To securely implement SharePoint Server 2010, you must understand the authentication and authorization capabilities of the system.
In this chapter, you will learn about the authentication methods available for access to SharePoint Server 2010 sites and the process ...