Chapter 5

Planning the Security Architecture

TOPICS COVERED IN THIS CHAPTER

  • Planning Authentication Methods
  • Planning for Secure Sites
  • Designing Authorization
  • Planning Web Application Security
  • Planning Code Access Security

The simplest way to deploy SharePoint Server 2010, or any other content-management and collaboration system, would be to give all users access to all information. However, in the real world of modern organizations, such a security plan is simply not sufficient. To securely implement SharePoint Server 2010, you must understand the authentication and authorization capabilities of the system.

In this chapter, you will learn about the authentication methods available for access to SharePoint Server 2010 sites and the process ...

Get Microsoft® SharePoint® 2010 Administration: Real-World Skills for MCITP Certification and Beyond now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.