SlideShare a Scribd company logo
SharePoint Security Framework Model Department of Premier & Cabinet Presented by: DPC IT – David Liong
Presentation Contents Introduction: What is it? Overview of security model Setting up (prior to  implementation):  Security group  Security permission on contents, page and sub-sites Security Feature Overview Demo Summary SharePoint Security Framework Model
Introduction SharePoint Security Framework model used for DPC & PSC is based originally from the SharePoint community group who created the  CKS FBA  (Community Kit for SharePoint Form Base Authentication). CKS FBA is a open source code that uses set of .NET technologies of Web Parts, tools with SQL membership provider in managing external users account who don’t have AD and visits a public interfacing website that is either secured entirely or at partial sections of sites i.e. either at the sub-site, page or content levels. SharePoint Security Framework Model
Overview dsfaa SharePoint Security Framework Model Synchronize content http://<intranet domain>:<port No.> http://<extranet domain> or https:// Active Directory SQL Database Content DB source
Security Group Setup SharePoint Security Framework Model Internal (AD) and/or External  Administrator Create SharePoint group to define roles Site Administrators group Site Collection Administrators group SQL Database Site A Site B Maintains  external users for Site A  Site A Site B External Users External Members group External Visitors group Site A SQL Database Unable to view any users from SQL DB Maintains external users for Site B Maintains ALL external users for all sites Create permission on who has access to sub-sites, page s, web-part sand content s
Permission Security Setup SharePoint Security Framework Model Internal Users Configure who has access permission to sub-sites, pages & contents AD & External Site Administrators group Site A Full control permission rights to site  External Users External Members group External Visitors group Other AD groups Use  target audience  property for giving permission on :  i) Web Parts ii) Page Permission level  feature   on sub-sites
Web-part Permissions Setup SharePoint Security Framework Model Internal (AD) Users Secure certain content section of a public page(s) to certain target audience External Users External Members group External Visitors group Other AD groups (non admin)
Web Page Permissions Setup SharePoint Security Framework Model Internal (AD) Users Secure certain page(s) to certain target audience External Users External Members group External Visitors group Other AD groups (non admin) Note: Only hide navigation URL and so unauthorized people can get to the hidden page but secured content will not be displayed.
Sub-Site Permissions Setup SharePoint Security Framework Model Internal (AD) Users Secure certain page(s) to certain target audience External Users External Members group External Visitors group Other AD groups (non admin) Note: Navigation URL is displayed but unauthorized people will get denied access when the navigation link is click.
Security Feature Overview SharePoint Security Framework Model CKS FBA has the following features: Web-Parts Login web-part:  Lock out user account after 3 invalid login attempts for external users. Site administrator will unlock user account & reset password which will notify user via email  New registration web-part:  Adopts network password policy, i.e. Must be alphanumeric characters (at least 1 upper & lower case letter and 1 digit 0-9); Character must be at least 6 characters minimum up to 15 characters length maximum; At least 1 non alphanumeric character e.g. Password1!  - valid
Security Feature Overview SharePoint Security Framework Model CKS FBA has the following features: Web-Parts Password recovery web-part:  Resets user’s password and emails the user with a temporary password. Change password web-part:  Adopts network password policy when changing old password to a new password. User Account UI:  Administrator can manage external user accounts in SharePoint.
Demo SharePoint Security Framework Model Add a new registered member Change password Reset password
Security Architecture SharePoint Security Framework Model Website application outage occur will not be affected  to other websites. SQL DB server outage will affect ALL sites. However DB outage will not be an issue if Windows Live ID authentication for SharePoint is adopted. SSL license for each independent websites (if required)
Security Feature Summaries SharePoint Security Framework Model What CKS FBA has delivered: Password is encrypted in SQL DB and from web interface and follows dept. password policy. A user has ability to request website access via website. And a record will be automatically save into SQL User List database.  Site administrator will receive an email, and can grant permission for the pending new registration request. User will then receive the login authorization email with the automatically generated password in plain text, when site administrator approves request. New registered user can change password. Forgotten password function sends a new password to the registered email address. Web interface to allow site administrator can create a new user & add user into a site group, deactivate or delete a user from site level. The record will be saved into SQL DB.
Security Feature Summaries SharePoint Security Framework Model Some enhancements for CKS FBA in phase 2: Need a logout button for the log-in web part, so that external users can log out from site if SharePoint template site does not provide out of the box sign-out link. Hide login button and display user’s name after user has been authenticated. No website interface in SharePoint to display list of all users information for all sites from SQL database. (e.g. UI ability for Administrator to unlock a user if SQL locks user's account after  3 number of failed logon attempts before password reset can be implemented) FBA page locks user accounts after x number of failed logon attempts but does not make the user be aware that his/her account has been locked. Generate reports on which sites a specific user has access to, and which users have access to a specific site. Change password web-part does not validate if existing password that was entered by user is the same as the new password. Hence existing external user can retain their old password by keeping password change the same.  Send an email to users at the same time after when a user resets their passwords.
FAQ SharePoint Security Framework Model Any Questions?

More Related Content

What's hot (15)

Advanced BCS - Business Data Connectivity Models and Custom Connectors
Advanced BCS - Business Data Connectivity Models and Custom ConnectorsAdvanced BCS - Business Data Connectivity Models and Custom Connectors
Advanced BCS - Business Data Connectivity Models and Custom Connectors
Corey Roth
 
Session 3c The SF SaaS Framework
Session 3c  The SF SaaS FrameworkSession 3c  The SF SaaS Framework
Session 3c The SF SaaS Framework
Code Mastery
 
Taking a Pragmatic Look at the Salesforce Security Model
Taking a Pragmatic Look at the Salesforce Security ModelTaking a Pragmatic Look at the Salesforce Security Model
Taking a Pragmatic Look at the Salesforce Security Model
Salesforce Developers
 
Single sign on using SAML
Single sign on using SAML Single sign on using SAML
Single sign on using SAML
Programming Talents
 
Mule security-jaas
Mule security-jaasMule security-jaas
Mule security-jaas
Praneethchampion
 
Manage and consume the api
Manage and consume the apiManage and consume the api
Manage and consume the api
Achyuta Lakshmi Puvvala
 
Active Directory Single Sign-On with IBM
Active Directory Single Sign-On with IBMActive Directory Single Sign-On with IBM
Active Directory Single Sign-On with IBM
Van Staub, MBA
 
Extending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partnersExtending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partners
Corey Roth
 
Google App Engine - Overview #1
Google App Engine - Overview #1Google App Engine - Overview #1
Google App Engine - Overview #1
Kay Kim
 
Visio Diagram of a user SSO Flow
Visio Diagram of a user SSO FlowVisio Diagram of a user SSO Flow
Visio Diagram of a user SSO Flow
Mike Reams
 
Authentication with OAuth and Connected Apps
Authentication with OAuth and Connected AppsAuthentication with OAuth and Connected Apps
Authentication with OAuth and Connected Apps
Salesforce Developers
 
Mule Salesforce Connector
Mule Salesforce ConnectorMule Salesforce Connector
Mule Salesforce Connector
Ankush Sharma
 
Microsoft identity manoj mittal
Microsoft identity manoj mittalMicrosoft identity manoj mittal
Microsoft identity manoj mittal
Manoj Mittal
 
Introducing SAML 2.0 Protocol: Security and Performance
Introducing SAML 2.0 Protocol: Security and PerformanceIntroducing SAML 2.0 Protocol: Security and Performance
Introducing SAML 2.0 Protocol: Security and Performance
Amin Saqi
 
Anypoint platform highlights
Anypoint platform highlightsAnypoint platform highlights
Anypoint platform highlights
himajareddys
 
Advanced BCS - Business Data Connectivity Models and Custom Connectors
Advanced BCS - Business Data Connectivity Models and Custom ConnectorsAdvanced BCS - Business Data Connectivity Models and Custom Connectors
Advanced BCS - Business Data Connectivity Models and Custom Connectors
Corey Roth
 
Session 3c The SF SaaS Framework
Session 3c  The SF SaaS FrameworkSession 3c  The SF SaaS Framework
Session 3c The SF SaaS Framework
Code Mastery
 
Taking a Pragmatic Look at the Salesforce Security Model
Taking a Pragmatic Look at the Salesforce Security ModelTaking a Pragmatic Look at the Salesforce Security Model
Taking a Pragmatic Look at the Salesforce Security Model
Salesforce Developers
 
Active Directory Single Sign-On with IBM
Active Directory Single Sign-On with IBMActive Directory Single Sign-On with IBM
Active Directory Single Sign-On with IBM
Van Staub, MBA
 
Extending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partnersExtending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partners
Corey Roth
 
Google App Engine - Overview #1
Google App Engine - Overview #1Google App Engine - Overview #1
Google App Engine - Overview #1
Kay Kim
 
Visio Diagram of a user SSO Flow
Visio Diagram of a user SSO FlowVisio Diagram of a user SSO Flow
Visio Diagram of a user SSO Flow
Mike Reams
 
Authentication with OAuth and Connected Apps
Authentication with OAuth and Connected AppsAuthentication with OAuth and Connected Apps
Authentication with OAuth and Connected Apps
Salesforce Developers
 
Mule Salesforce Connector
Mule Salesforce ConnectorMule Salesforce Connector
Mule Salesforce Connector
Ankush Sharma
 
Microsoft identity manoj mittal
Microsoft identity manoj mittalMicrosoft identity manoj mittal
Microsoft identity manoj mittal
Manoj Mittal
 
Introducing SAML 2.0 Protocol: Security and Performance
Introducing SAML 2.0 Protocol: Security and PerformanceIntroducing SAML 2.0 Protocol: Security and Performance
Introducing SAML 2.0 Protocol: Security and Performance
Amin Saqi
 
Anypoint platform highlights
Anypoint platform highlightsAnypoint platform highlights
Anypoint platform highlights
himajareddys
 

Similar to SharePoint 2007 Security (20)

Resume
ResumeResume
Resume
Saiprakash Revuri
 
Microsoft Tech Ed 2006 #2
Microsoft Tech Ed 2006 #2Microsoft Tech Ed 2006 #2
Microsoft Tech Ed 2006 #2
Jetsada Phantharangsee
 
3.dev meetup2 visualforce_sites_a_pruzan
3.dev meetup2 visualforce_sites_a_pruzan3.dev meetup2 visualforce_sites_a_pruzan
3.dev meetup2 visualforce_sites_a_pruzan
Nata Isaevich
 
SharePoint as Development Platform for the Modern Intranet
SharePoint as Development Platform for the Modern IntranetSharePoint as Development Platform for the Modern Intranet
SharePoint as Development Platform for the Modern Intranet
Haaron Gonzalez
 
ASP.NET Lecture 5
ASP.NET Lecture 5ASP.NET Lecture 5
ASP.NET Lecture 5
Julie Iskander
 
Microsoft Tech Ed 2006 #1
Microsoft Tech Ed 2006 #1Microsoft Tech Ed 2006 #1
Microsoft Tech Ed 2006 #1
Jetsada Phantharangsee
 
Designing SharePoint 2010 for Business
Designing SharePoint 2010 for BusinessDesigning SharePoint 2010 for Business
Designing SharePoint 2010 for Business
Kanwal Khipple
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
AntonioMaio2
 
Parallelminds.web partdemo1
Parallelminds.web partdemo1Parallelminds.web partdemo1
Parallelminds.web partdemo1
parallelminder
 
Sps Boston The Share Point Beast
Sps Boston   The Share Point BeastSps Boston   The Share Point Beast
Sps Boston The Share Point Beast
gueste918732
 
AspMVC4 start101
AspMVC4 start101AspMVC4 start101
AspMVC4 start101
Rich Helton
 
AUSPC 2011: How we did it: NothingButSharePoint.com
AUSPC 2011: How we did it: NothingButSharePoint.comAUSPC 2011: How we did it: NothingButSharePoint.com
AUSPC 2011: How we did it: NothingButSharePoint.com
Jeremy Thake
 
Easy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 UsmanEasy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 Usman
Usman Zafar Malik
 
Easy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 UsmanEasy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 Usman
Usman Zafar Malik
 
Case study for share point implementation for social intranet
Case study for share point implementation for social intranetCase study for share point implementation for social intranet
Case study for share point implementation for social intranet
Grey Matter India Technologies PVT LTD
 
Continental Airlines 2009 Microsoft SharePoint Conference Presentation
Continental Airlines 2009 Microsoft SharePoint Conference PresentationContinental Airlines 2009 Microsoft SharePoint Conference Presentation
Continental Airlines 2009 Microsoft SharePoint Conference Presentation
Denise Wilson
 
SharePoint Development For Asp Net Developers
SharePoint Development For Asp Net DevelopersSharePoint Development For Asp Net Developers
SharePoint Development For Asp Net Developers
Corey Roth
 
SharePoint 2013 App Provisioning Models
SharePoint 2013 App Provisioning ModelsSharePoint 2013 App Provisioning Models
SharePoint 2013 App Provisioning Models
Shailen Sukul
 
Lightning components ver1.0
Lightning components ver1.0Lightning components ver1.0
Lightning components ver1.0
Akhil Anil ☁
 
Php Web Frameworks
Php Web FrameworksPhp Web Frameworks
Php Web Frameworks
Shreyans Jasoriya
 
3.dev meetup2 visualforce_sites_a_pruzan
3.dev meetup2 visualforce_sites_a_pruzan3.dev meetup2 visualforce_sites_a_pruzan
3.dev meetup2 visualforce_sites_a_pruzan
Nata Isaevich
 
SharePoint as Development Platform for the Modern Intranet
SharePoint as Development Platform for the Modern IntranetSharePoint as Development Platform for the Modern Intranet
SharePoint as Development Platform for the Modern Intranet
Haaron Gonzalez
 
Designing SharePoint 2010 for Business
Designing SharePoint 2010 for BusinessDesigning SharePoint 2010 for Business
Designing SharePoint 2010 for Business
Kanwal Khipple
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
AntonioMaio2
 
Parallelminds.web partdemo1
Parallelminds.web partdemo1Parallelminds.web partdemo1
Parallelminds.web partdemo1
parallelminder
 
Sps Boston The Share Point Beast
Sps Boston   The Share Point BeastSps Boston   The Share Point Beast
Sps Boston The Share Point Beast
gueste918732
 
AspMVC4 start101
AspMVC4 start101AspMVC4 start101
AspMVC4 start101
Rich Helton
 
AUSPC 2011: How we did it: NothingButSharePoint.com
AUSPC 2011: How we did it: NothingButSharePoint.comAUSPC 2011: How we did it: NothingButSharePoint.com
AUSPC 2011: How we did it: NothingButSharePoint.com
Jeremy Thake
 
Easy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 UsmanEasy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 Usman
Usman Zafar Malik
 
Easy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 UsmanEasy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 Usman
Usman Zafar Malik
 
Continental Airlines 2009 Microsoft SharePoint Conference Presentation
Continental Airlines 2009 Microsoft SharePoint Conference PresentationContinental Airlines 2009 Microsoft SharePoint Conference Presentation
Continental Airlines 2009 Microsoft SharePoint Conference Presentation
Denise Wilson
 
SharePoint Development For Asp Net Developers
SharePoint Development For Asp Net DevelopersSharePoint Development For Asp Net Developers
SharePoint Development For Asp Net Developers
Corey Roth
 
SharePoint 2013 App Provisioning Models
SharePoint 2013 App Provisioning ModelsSharePoint 2013 App Provisioning Models
SharePoint 2013 App Provisioning Models
Shailen Sukul
 
Lightning components ver1.0
Lightning components ver1.0Lightning components ver1.0
Lightning components ver1.0
Akhil Anil ☁
 

Recently uploaded (20)

fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
AsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API DesignAsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API Design
leonid54
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
Top-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptxTop-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptx
BR Softech
 
Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Q1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor PresentationQ1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor Presentation
Dropbox
 
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Raffi Khatchadourian
 
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)
Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)
Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
João Esperancinha
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptxSmart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Seasia Infotech
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
AsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API DesignAsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API Design
leonid54
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
Top-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptxTop-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptx
BR Softech
 
Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Q1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor PresentationQ1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor Presentation
Dropbox
 
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Raffi Khatchadourian
 
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
João Esperancinha
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptxSmart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Seasia Infotech
 

SharePoint 2007 Security

  • 1. SharePoint Security Framework Model Department of Premier & Cabinet Presented by: DPC IT – David Liong
  • 2. Presentation Contents Introduction: What is it? Overview of security model Setting up (prior to implementation): Security group Security permission on contents, page and sub-sites Security Feature Overview Demo Summary SharePoint Security Framework Model
  • 3. Introduction SharePoint Security Framework model used for DPC & PSC is based originally from the SharePoint community group who created the CKS FBA (Community Kit for SharePoint Form Base Authentication). CKS FBA is a open source code that uses set of .NET technologies of Web Parts, tools with SQL membership provider in managing external users account who don’t have AD and visits a public interfacing website that is either secured entirely or at partial sections of sites i.e. either at the sub-site, page or content levels. SharePoint Security Framework Model
  • 4. Overview dsfaa SharePoint Security Framework Model Synchronize content http://<intranet domain>:<port No.> http://<extranet domain> or https:// Active Directory SQL Database Content DB source
  • 5. Security Group Setup SharePoint Security Framework Model Internal (AD) and/or External Administrator Create SharePoint group to define roles Site Administrators group Site Collection Administrators group SQL Database Site A Site B Maintains external users for Site A Site A Site B External Users External Members group External Visitors group Site A SQL Database Unable to view any users from SQL DB Maintains external users for Site B Maintains ALL external users for all sites Create permission on who has access to sub-sites, page s, web-part sand content s
  • 6. Permission Security Setup SharePoint Security Framework Model Internal Users Configure who has access permission to sub-sites, pages & contents AD & External Site Administrators group Site A Full control permission rights to site External Users External Members group External Visitors group Other AD groups Use target audience property for giving permission on : i) Web Parts ii) Page Permission level feature on sub-sites
  • 7. Web-part Permissions Setup SharePoint Security Framework Model Internal (AD) Users Secure certain content section of a public page(s) to certain target audience External Users External Members group External Visitors group Other AD groups (non admin)
  • 8. Web Page Permissions Setup SharePoint Security Framework Model Internal (AD) Users Secure certain page(s) to certain target audience External Users External Members group External Visitors group Other AD groups (non admin) Note: Only hide navigation URL and so unauthorized people can get to the hidden page but secured content will not be displayed.
  • 9. Sub-Site Permissions Setup SharePoint Security Framework Model Internal (AD) Users Secure certain page(s) to certain target audience External Users External Members group External Visitors group Other AD groups (non admin) Note: Navigation URL is displayed but unauthorized people will get denied access when the navigation link is click.
  • 10. Security Feature Overview SharePoint Security Framework Model CKS FBA has the following features: Web-Parts Login web-part: Lock out user account after 3 invalid login attempts for external users. Site administrator will unlock user account & reset password which will notify user via email New registration web-part: Adopts network password policy, i.e. Must be alphanumeric characters (at least 1 upper & lower case letter and 1 digit 0-9); Character must be at least 6 characters minimum up to 15 characters length maximum; At least 1 non alphanumeric character e.g. Password1! - valid
  • 11. Security Feature Overview SharePoint Security Framework Model CKS FBA has the following features: Web-Parts Password recovery web-part: Resets user’s password and emails the user with a temporary password. Change password web-part: Adopts network password policy when changing old password to a new password. User Account UI: Administrator can manage external user accounts in SharePoint.
  • 12. Demo SharePoint Security Framework Model Add a new registered member Change password Reset password
  • 13. Security Architecture SharePoint Security Framework Model Website application outage occur will not be affected to other websites. SQL DB server outage will affect ALL sites. However DB outage will not be an issue if Windows Live ID authentication for SharePoint is adopted. SSL license for each independent websites (if required)
  • 14. Security Feature Summaries SharePoint Security Framework Model What CKS FBA has delivered: Password is encrypted in SQL DB and from web interface and follows dept. password policy. A user has ability to request website access via website. And a record will be automatically save into SQL User List database. Site administrator will receive an email, and can grant permission for the pending new registration request. User will then receive the login authorization email with the automatically generated password in plain text, when site administrator approves request. New registered user can change password. Forgotten password function sends a new password to the registered email address. Web interface to allow site administrator can create a new user & add user into a site group, deactivate or delete a user from site level. The record will be saved into SQL DB.
  • 15. Security Feature Summaries SharePoint Security Framework Model Some enhancements for CKS FBA in phase 2: Need a logout button for the log-in web part, so that external users can log out from site if SharePoint template site does not provide out of the box sign-out link. Hide login button and display user’s name after user has been authenticated. No website interface in SharePoint to display list of all users information for all sites from SQL database. (e.g. UI ability for Administrator to unlock a user if SQL locks user's account after  3 number of failed logon attempts before password reset can be implemented) FBA page locks user accounts after x number of failed logon attempts but does not make the user be aware that his/her account has been locked. Generate reports on which sites a specific user has access to, and which users have access to a specific site. Change password web-part does not validate if existing password that was entered by user is the same as the new password. Hence existing external user can retain their old password by keeping password change the same. Send an email to users at the same time after when a user resets their passwords.
  • 16. FAQ SharePoint Security Framework Model Any Questions?
  翻译: