Apr 05, 2016
When we start working with security in SharePoint you have to understand that SharePoint in itself is not an Authentication Provider. What I mean by authentication provider is the component that is responsible for authenticating users to a particular system. One of the most common authentication providers that SharePoint uses is Active Directory.
Now that we know SharePoint (SP) relies on active directory or AD, we can look at how it works with AD to do the authentication. One of the common modes is claims based authentication, this works in the following way:
- If the user is not authenticated yet, they will send an anonymous access request to a SP resource
- SP checks to see if the resource can be accessed anonymously
- If the user cannot access the resource anonymously, SP will ask the user for authentication credentials.
- The user then provides the authentication credentials and send it to SP
- SP then send this authentication credentials to AD, this will allow AD to perform the authentication
- If AD has authenticated it will create a security token that contains the information of the user and the authenticated status
- AD sends back this security token and SP will check this user against all the security groups in AD and find out to which groups it belongs
- SP then uses is STS (Secure Token Service) to create a claims security token that will now be cached for the whole farm.
How do your Excel skills stack up?
Test NowNext up:
- Handling non-performing employees fairly and with common-sense
- Creating Custom Shows in PowerPoint
- Protecting Confidential Data with Symmetric Encryption - Part 2
- How to create Microsoft Excel Scenarios Summary Report
- Creating a Point-to-Site VPN to your Azure Virtual Machines
- The future is here
- Tune Your SSD for Windows 10
- Screen Clippings with Hyperlinks in OneNote
- The confident negotiator consistently gets to ‘yes’
- Ten Tips for Using Microsoft Project
Previously
- Master Managers are Master Planners
- Protecting Confidential Data with Symmetric Encryption
- How to create Scenarios with Microsoft Excel
- Who is a bad boss then?
- Fundamentals of Microsoft Azure
- Why is it so hard to apologise?
- Using a model in your AngularJS form
- Corruption found in Professional Development training company
- More PowerShell Constructs and Loop Management
- Leaping over communication hurdles