+ All Categories
Home > Technology > SharePoint Security A to Z

SharePoint Security A to Z

Date post: 18-Jan-2015
Category:
Upload: steve-goldberg
View: 946 times
Download: 1 times
Share this document with a friend
Description:
The session will address the different ways users can be authenticated in SharePoint: Active Directory, forms based authentication, claims based authentication, and anonymous access. I’ll discuss when to implement each method and what the best practices are for permission application and management. I’ll address when to use each method and when to implement other concepts like web application policies, extending web applications, laying out a decentralized security model.   To abide by this best practice, I’ll discuss how the farm’s taxonomy may need to be restructured. This is where administrators need to develop and enforce a governance plan around the farm’s taxonomy. Thinking about where lists, items, and groups need to be in a SharePoint farm will ensure the right eyes are seeing the right content- and nothing more.   The goal of the session is to ensure SharePoint content is secure and permissions do not get out of control. I’ll take a deep dive into what is available out of the box and what you can customize. Finally, I’ll also demonstrate how to utilize SharePoint’s auditing functionality to track who is changing permissions. The audit reports will be used to ensure the admins changing permissions are taking the correct action. When administrators know all their options around security, internal governance plans can be developed to safeguard their farm’s content.
52
SharePoint Security A-Z: Who Has Access to What? Steve Goldberg, Axceler [email protected] @iamgoldberg
Transcript
Page 1: SharePoint Security A to Z

SharePoint Security A-Z:Who Has Access to What?

Steve Goldberg, Axceler

[email protected]@iamgoldberg

Page 2: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

About Me

Steve Goldberg, Sales Engineer at Axceler

• Software Engineer at Axceler for ControlPoint- a SharePoint administration product

• Prior to Axceler, was a consultant at Computer Sciences Corporation (CSC), specializing in SharePoint development

• Current Role:

• Talk to 30-40 people weekly about how to govern SharePoint

• Managing permissions is the #1 issue administrators face

• Manage and cleanup

• Twitter: @iamgoldberg Blog: iamgoldberg.com Email: [email protected]

Page 3: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Improving Collaboration Since 2007 Mission: To enable enterprises to simplify, optimize, and

secure their collaborative platforms Delivered award-winning administration and migration

software since 1994 Over 2,500 global customers

Dramatically improve the management of SharePoint

Innovative products that improve security, scalability, reliability, “deployability”

Making IT more effective and efficient and lower the total cost of ownership

Focus on solving specific SharePoint problems (Administration & Migration)

Coach enterprises on SharePoint best practices Give administrators the most innovative tools available Anticipate customers’ needs Deliver best of breed offerings Stay in lock step with SharePoint development and market trends

Axceler Overview

Page 4: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

How is your organization using SharePoint?

Is there secure content in your SharePoint environment?

Who needs to have access to SharePoint?

Are there ways you can expand the use of SharePoint to offer more benefits to your

organization? 04/10/2023

Always Ask Yourself…

Page 5: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

04/10/2023

Page 6: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

A SharePoint environment must support user accounts that can be

authenticated by a trusted authority

How do you authenticate your users?

Authentication Methods

Page 7: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

NTLM: Users authenticated by using the credentials on the running

thread Simple to implement

SharePoint will not be integrated with other applications

Kerberos If your SharePoint sites use external data

Credentials passed from one server to another (“double hop”) Faster, more secure, and can be less error prone then NTLM

Anonymous Access No authentication needed to browse the site

Windows Authentication

Page 8: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Authentication based on user account and password from AD

This works well for Windows environments

Do you need support Internet, partner, or cloud-based computing models?

04/10/2023

Active Directory Domain Services (AD DS) 

Page 9: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Used mostly for Extranets

Credentials stored in: Lightweight Directory Access Protocol (LDAP) data store (Novell, Sun) AD DS SQL or other database Custom or third-party membership and role providers

In SharePoint 2010, forms-based authentication is only available when you use claims-based authentication

Forms-based Authentication

Page 10: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Usually for external customers or partners

An outside identity provider authenticates users

A claim is just a piece of information describing a user: name, email, age, hire date, etc. used to authenticate the user

Claims-Based Authentication (SharePoint

2010)

Page 11: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Integration with Facebook, Google, Live ID, etc.

1. “I’d like to access the Axceler Microsoft technology partners site.”

2. “Not until you can prove to me that you are in the Axceler Microsoft technology partners group.”

3. “Here is my Live ID and password.”4. “Hi, Steve. I see you are in the Axceler Microsoft

technology partners group. Here is a token you can use.”5. “I’d like to access the Axceler Microsoft technology

partner document, and here’s proof I have access to it!”

04/10/2023

So Much Potential…

Page 12: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Defined at the web application level

SharePoint Authentication

Page 13: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Claims-based authentication mode: use any supported authentication method or else you will support only Windows authentication

04/10/2023

Who Needs to Access SharePoint?

Page 14: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Is permission management part of your governance plan?

Now That We’ve Authenticated Our Users….

Page 15: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Governance is about taking action to help your organization

organize, optimize, and manage your systems and

resources.

Page 16: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

What do your permissions look like in SharePoint?

Page 17: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Page 18: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

No plan

The business grows and evolves

People and project turn over

How did that happen?

Page 19: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

What can we secure?SiteLibrary or ListFolderDocument or Item

Securable Objects

Page 20: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Structure/Architecture

Farm

Web App

Site Collectio

n

SiteSub-site

Sub-siteSite

Site Sub-site

Site Collectio

nSite

Web AppSite

Collection

Site

Site Sub-site

Page 21: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

How granular do you need to control access to content?

Who manages all the different parts of your SharePoint farm?

How do you want to manage your users?

Plan!

Page 22: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Assigned in Central Admin and has permission to all servers and settings in the

farm

Central Administration access, create new web apps, manage services, stsadm/PowerShell commandCan take ownership of content: make

themselves Site Collection Administrators04/10/2023

Farm Administrators Group

Page 23: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Quick way to apply permissions across web applications

Users can be explicitly denied access

Set in Central Admin

04/10/2023

Web Application Policies

Page 24: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Given full control over all sites in a site collection

Access to settings pages: Manage users, restores items, manage site hierarchy

Cannot access Central Admin04/10/2023

Site Collection Administrators

Page 25: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Your Content

Site Collectio

n

Site Sub-Sites

Site Sub-site

Lists/Libraries

Lists/Libraries

Lists/Libraries

Lists/Libraries

Page 26: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Collections of permissions that allow users to perform

a set of related tasks

Permission levels are defined at the site collection level

Permission Levels

Page 27: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

A group of users that are defined at site collection level for easy management of permissions

The default SharePoint groups are Owners, Visitors, and Members, with Full Control, Read, and Contribute as their default permission levels respectively

Anyone with Full Control permission can create custom groups

04/10/2023

SharePoint Groups

Page 28: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

The default permission levels are Full Control, Design, Contribute, Read, and

Limited Access

What does “Read” mean to your organization?

04/10/2023

Customizing Permission Levels

Page 29: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Permissions are applied on objects:1. Directly to users2. Directly to domain groups

(visibility warning)

3. To SharePoint Groups

The Basics: Permissions

Page 30: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

SharePoint 2010 lets administrators Check Permissions to determine a user or group’s permissions on all content

04/10/2023

Check Permission Button

Page 31: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

If all sites and site content inherit those permissions

defined at the site collection, what’s so hard about managing permissions if they are defined

so high in the hierarchy?

Inheritance

Page 32: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Sites, lists, libraries, folders, documents, items can all

have unique security

Fine Grained Permissions

Page 33: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Copies groups, users, and permission levels from the parent object to the child object

Changes to parent object do not affect the child

04/10/2023

What Exactly is Happening?

Page 34: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Auto applied to every securable objects above the uniquely

permissioned item

Is not directly “applied”

04/10/2023

Limited Access

Page 35: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

“If you use fine-grained permissions extensively, you will spend more time managing the permissions, and users will experience slower performance

when they try to access site content”~Planning site permissions, technet http://bit.ly/InKv9i

Permission management (additions, deletions, edits) is done one securable object at a time!

04/10/2023

Permissions Management Becomes Impossible

Page 36: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Performance is reduced once 1000 objects have broken inheritance in a list or library

Sites, lists, and libraries need to build security trimmed navigation

List load time increases

*Apply unique permissions to folders if need be*

04/10/2023

Performance is Affected too!

Page 37: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Deleted and disabled Active Directory users are not updated in SharePoint

PermissionsUser ProfilesMy Sites

04/10/2023

Orphaned Domain Users

Page 38: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

SharePoint is designed to have

site administrators and power users

04/10/2023

Distributed Administration

Page 39: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Train your admins and power users!

“I didn’t know that restoring inheritance would remove our unique security model!”

~Countless well intentioned site admins

04/10/2023

Be Careful!

Page 40: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Manage power users through the “Owners” SharePoint groups.

limit the members to only those users you trust to change the structure, settings, or appearance of the site

04/10/2023

Power Users Tip

Page 41: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Make most users members of the Members or Visitors groups

Members group can contribute to the site by adding or removing items or documents, but cannot change the structure, site settings, or appearance of the site.

Visitors group has read-only access to the site, which means that they can see pages and items, and open items and documents, but cannot add or remove pages, items, or documents.

04/10/2023

Best Practice

Page 42: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

If you do break inheritance, Microsoft recommends using groups to avoid having to

track individual users

People move in and out of teams and change responsibilities frequently

Tracking those changes and updating the permissions for uniquely secured objects would be

time-consuming and error-prone.04/10/2023

Stick to the Plan

Page 43: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Arrange sites and subsites, and lists and libraries so they can share most

permissions

Separate sensitive data into their own lists, libraries, or subsite

Permission worksheet:http://go.microsoft.com/fwlink/p/?LinkID=213970&clcid=0x409

04/10/2023

Plan for Permission Inheritance

Page 44: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Administrators can audit permission changes by going to the site collection’s

settings page

04/10/2023

It’s SharePoint’s Fault!

Page 45: SharePoint Security A to Z

Questions and Answers

Page 46: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Steve [email protected]@iamgoldberg

Additional Resources available 11 Strategic Considerations for SharePoint Migrations http://

bit.ly/j4Vuln

The Insider’s Guide to Upgrading to SharePoint 2010 http://bit.ly/mIpOBZ

Why Do SharePoint Projects Fail? http://bit.ly/d1mJmw

Best practices for capacity management for SharePoint Server 2010, TechNet http://bit.ly/nvNrig

What to Look for in a SharePoint Management Tool http://bit.ly/l26ida

The Five Secrets to Controlling Your SharePoint Environment http://bit.ly/kzdTjZ

Contact me

Page 47: SharePoint Security A to Z

We want your feedback!Use this QR code or visit:http://sps.la/feedback

Silver Sponsors:

Page 48: SharePoint Security A to Z

Victory Lap- social event "SharePoint Victory Lap" Social Event for

SPSLA will be at: 5:30pm to 8pm at Di Piazzas (5205 E. Pacific Coast Hwy, 90804)

Page 49: SharePoint Security A to Z

What I left out…

Page 50: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

- Basic: - Users have previously assigned Windows credentials- Browser provides credentials during HTTP transaction- Not encrypted- should enable Secure Sockets Layer

(SSL) encryption

- Digest- Credentials are encrypted

These are set directly in IIS

Windows Authentication

Page 51: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

Each "zone" is essentially a new IIS Website Access the same content through a different

URLAllows for multiple authentication methods

to the same siteSince SharePoint 2010 allows web

applications to have mixed authentication methods when choosing claims based authentication, zones are more useful to for load balancing, caching, content databases, and custom modules

04/10/2023

Zones

Page 52: SharePoint Security A to Z

Email Cell Twitter Blog

[email protected] 425.246.2823 @buckleyplanet http://buckleyplanet.com

To display content such as list or library items, navigation links, and entire Web Parts to specific groups of people. This is useful when you want to present

information that is relevant only to a particular group of people. For example, you can add a Web Part to the legal department's portal site that contains a list of legal contracts that is visible only to that department.

04/10/2023

Audience targeting


Recommended