O'Reilly logo

Microsoft® SharePoint® Designer 2010 Unleashed by Kathy Hughes

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security and Identity (Authentication)

A Web application also defines the authentication protocol used to access related site collections. For instance, a Web application maps directly to an IIS website and SharePoint server administrators can choose to enable anonymous access, forms authentication, or NTLM or Kerberos authentication. An organization might choose to create additional Web applications in an environment where customers need to access content anonymously, such as in an Internet, or public-facing, SharePoint site. The more Web applications within a farm, the greater the administrative overhead.

The authentication methods and protocols in SharePoint 2010 are extensible. Authentication protocols include Windows (Anonymous, Digest, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required