SlideShare a Scribd company logo
1 of 27
Permissions: Designed to Scale

           Jamie Aliperti

        jamie.aliperti@axceler.com
                 @jaliperti


                         SharePoint Saturday Portland
                                        May 19th, 2012
About Me
  Sales Engineering
  Manager
  Axceler
  based out of the Los Angeles
  office, and spend most of my time
  providing consultancy, training and
  support to current and future
  customers. I have over 7 years
  experience with Microsoft
  technologies, and lead the Los
  Angeles Sales Engineering team.       Email: Jamie.Aliperti@axceler.com
                                        Twitter: @jaliperti
About Axceler
Improving SharePoint Collaboration Since 2007
  Mission: To enable enterprises to simplify, optimize, and
  secure their collaborative platforms
  Delivered award-winning administration and migration
  software since 1994
  Over 2,000 global customers
Dramatically improve the management
of SharePoint
  Innovative products that improve security, scalability,
   reliability, “deployability”
  Making IT more effective and efficient and lower the total
  cost of ownership
Focus on solving specific SharePoint problems
(Administration & Migration)
  Coach enterprises on SharePoint best practices
  Give administrators the most innovative tools available
  Anticipate customers’ needs
  Deliver best of breed offerings
  Stay in lock step with SharePoint development and
  market trends
SharePoint Security


   Where to Start?

Anyone have any ideas?
Design Permissions as part of
            Governance


Governance is about taking action to
       help your organization
organize, optimize, and manage your
      systems and resources.
Questions to Ask


           How is your organization using
                             SharePoint?

           Is there secure content in your
                 SharePoint environment?

        Who is responsible for SharePoint
                                 Security?

                                      5/30/2012
Plan!

How granular do you need to control access to
 content?
Who manages all the different parts of your
 SharePoint farm?
How do you want to manage your users?
Farm Administrators Group


 Assigned in Central Admin and has permission to
       all servers and settings in the farm

Central Administration access, create new web
 apps, manage services, stsadm/PowerShell
 command
 Can take ownership of content: make
   themselves Site Collection Administrators

                                                   5/30/2012
Authentication Methods


  A SharePoint environment must
 support user accounts that can be
authenticated by a trusted authority


How do you authenticate your users?
Windows Authentication

 NTLM:
  Users authenticated by using the credentials on the running thread
  Simple to implement
     SharePoint will not be integrated with other applications

 Kerberos
  If your SharePoint sites use external data
     Credentials passed from one server to another (“double hop”)
  Faster, more secure, and can be less error prone then NTLM
 Anonymous Access
  No authentication needed to browse the site
SharePoint Authentication



Defined at the web application
             level
Who Needs to Access SharePoint?


 Claims-based authentication mode: use any supported
 authentication method or else you will support only
 Windows authentication




                                                       5/30/2012
Web Application Policies


      Quick way to apply permissions across web
                     applications

Only part of SharePoint where users can be explicitly
 denied access
Set in Central Admin



                                                         5/30/2012
Site Collection Administrators


Given full control over all sites in a site
               collection

Access to settings pages
 Manage users, restores
  items, manage site hierarchy
Cannot access Central Admin
                                              5/30/2012
Securable Objects


What can we secure?
Site
Library or List
Folder
Document or Item
Inheritance


If all sites and site content inherit
those permissions defined at the
   site collection, what’s so hard
  about managing permissions if
  they are defined so high in the
              hierarchy?
Structure/Architecture
                                       Sub-site
                                Site
                                       Sub-site
                      Site
                                Site
                   Collection

         Web App                Site   Sub-site

                      Site
                                Site
Farm               Collection

                                Site
                      Site
         Web App
                   Collection
                                Site   Sub-site
Permission Levels


Collections of permissions that
allow users to perform a set of
         related tasks

Permission levels are defined at the
        site collection level
Customizing Permission Levels


        The default permission levels are Full
Control, Design, Contribute, Read, and Limited Access

What does “Read” mean to
 your organization?




                                                        5/30/2012
SharePoint Groups


A group of users that are defined at site collection level
        for easy management of permissions

The default SharePoint groups are
 Owners, Visitors, and Members, with Full
 Control, Read, and Contribute as their default
 permission levels respectively

Anyone with Full Control permission can create custom
                       groups
                                                             5/30/2012
The Basics: Permissions


Permissions are applied on objects:
1. Directly to users
2. Directly to domain groups (visibility warning)
3. To SharePoint Groups
Best Practice


Make most users members of the Members or
              Visitors groups
 Members group can contribute to the site by adding or
  removing items or documents, but cannot change the
  structure, site settings, or appearance of the site.
 Visitors group has read-only access to the site, which
  means that they can see pages and items, and open items
  and documents, but cannot add or remove pages, items, or
  documents.

                                                             5/30/2012
Plan for Permission Inheritance


Arrange sites and subsites, and lists and libraries
      so they can share most permissions

         Separate sensitive data into their own
                lists, libraries, or subsite
Permission worksheet:
http://go.microsoft.com/fwlink/p/?LinkID=213970&clcid=0x409




                                                              5/30/2012
Stick to the Plan


 If you do break inheritance, Microsoft recommends
using groups to avoid having to track individual users

People move in and out of teams and change
 responsibilities frequently

 Tracking those changes and updating the permissions
for uniquely secured objects would be time-consuming
                   and error-prone.
                                                         5/30/2012
Go back and refine
Questions and Answers
Contact us for
  more info

Contact me: jamie.aliperti@axceler.com
            Twitter@jaliperti

More Related Content

What's hot

XCC Introduction - Web Content Management Extension for IBM Connections
XCC Introduction - Web Content Management Extension for IBM ConnectionsXCC Introduction - Web Content Management Extension for IBM Connections
XCC Introduction - Web Content Management Extension for IBM Connections
TIMETOACT GROUP
 
Sharepoint referenceportal
Sharepoint referenceportalSharepoint referenceportal
Sharepoint referenceportal
mulcahey99
 
IBM ConnectED 2015, Session SPOT107, XCC - Web Content & Custom Apps for IBM ...
IBM ConnectED 2015, Session SPOT107, XCC - Web Content & Custom Apps for IBM ...IBM ConnectED 2015, Session SPOT107, XCC - Web Content & Custom Apps for IBM ...
IBM ConnectED 2015, Session SPOT107, XCC - Web Content & Custom Apps for IBM ...
TIMETOACT GROUP
 
Share point presentation
Share point presentationShare point presentation
Share point presentation
Adeel Javaid
 
Share Point Voice Annotation
Share Point   Voice AnnotationShare Point   Voice Annotation
Share Point Voice Annotation
gma13
 

What's hot (20)

Social community datasheet
Social community datasheetSocial community datasheet
Social community datasheet
 
XCC Introduction - Web Content Management Extension for IBM Connections
XCC Introduction - Web Content Management Extension for IBM ConnectionsXCC Introduction - Web Content Management Extension for IBM Connections
XCC Introduction - Web Content Management Extension for IBM Connections
 
Sps ottawa 2012 slides - "my SharePoint is a production platform! not facebook!"
Sps ottawa 2012 slides - "my SharePoint is a production platform! not facebook!"Sps ottawa 2012 slides - "my SharePoint is a production platform! not facebook!"
Sps ottawa 2012 slides - "my SharePoint is a production platform! not facebook!"
 
Team Site Security for Site Owners - BPC11 - March 2011
Team Site Security for Site Owners - BPC11 - March 2011Team Site Security for Site Owners - BPC11 - March 2011
Team Site Security for Site Owners - BPC11 - March 2011
 
Sharepoint referenceportal
Sharepoint referenceportalSharepoint referenceportal
Sharepoint referenceportal
 
IBM ConnectED 2015, Session SPOT107, XCC - Web Content & Custom Apps for IBM ...
IBM ConnectED 2015, Session SPOT107, XCC - Web Content & Custom Apps for IBM ...IBM ConnectED 2015, Session SPOT107, XCC - Web Content & Custom Apps for IBM ...
IBM ConnectED 2015, Session SPOT107, XCC - Web Content & Custom Apps for IBM ...
 
Topic in-et
Topic in-etTopic in-et
Topic in-et
 
Integration SharePoint 2010 with CRM 2010 by Mai Omar Desouki
Integration SharePoint 2010 with CRM 2010 by Mai Omar DesoukiIntegration SharePoint 2010 with CRM 2010 by Mai Omar Desouki
Integration SharePoint 2010 with CRM 2010 by Mai Omar Desouki
 
University of Glasgow Eduserv Event Sharepoint
University of Glasgow Eduserv Event SharepointUniversity of Glasgow Eduserv Event Sharepoint
University of Glasgow Eduserv Event Sharepoint
 
Info 2.0 and IBM Mashup Center
Info 2.0 and IBM Mashup CenterInfo 2.0 and IBM Mashup Center
Info 2.0 and IBM Mashup Center
 
Elements_Users_and_Groups.pdf
Elements_Users_and_Groups.pdfElements_Users_and_Groups.pdf
Elements_Users_and_Groups.pdf
 
Worldwide Deployment
Worldwide DeploymentWorldwide Deployment
Worldwide Deployment
 
Social Content Management
Social Content ManagementSocial Content Management
Social Content Management
 
Share point presentation
Share point presentationShare point presentation
Share point presentation
 
Get ready for alfresco 4
Get ready for alfresco 4Get ready for alfresco 4
Get ready for alfresco 4
 
Sharepoint Admin
Sharepoint AdminSharepoint Admin
Sharepoint Admin
 
Swug apr 2010 - BPOS by Desmond and Andrew
Swug apr 2010 - BPOS by Desmond and AndrewSwug apr 2010 - BPOS by Desmond and Andrew
Swug apr 2010 - BPOS by Desmond and Andrew
 
Alfresco 4 launch keynote (Rome)
Alfresco 4 launch keynote   (Rome)Alfresco 4 launch keynote   (Rome)
Alfresco 4 launch keynote (Rome)
 
Share point 2010 administration training
Share point 2010 administration trainingShare point 2010 administration training
Share point 2010 administration training
 
Share Point Voice Annotation
Share Point   Voice AnnotationShare Point   Voice Annotation
Share Point Voice Annotation
 

Viewers also liked

Viewers also liked (6)

Las meninas
Las meninasLas meninas
Las meninas
 
Moo milk ad
Moo milk adMoo milk ad
Moo milk ad
 
SharePoint Reporting for administrators SPSLA
SharePoint Reporting for administrators SPSLASharePoint Reporting for administrators SPSLA
SharePoint Reporting for administrators SPSLA
 
Ngqiyuan
NgqiyuanNgqiyuan
Ngqiyuan
 
Trabajo Belen Sosa
Trabajo Belen SosaTrabajo Belen Sosa
Trabajo Belen Sosa
 
Trabajo Viridiana y Mariana
Trabajo Viridiana y MarianaTrabajo Viridiana y Mariana
Trabajo Viridiana y Mariana
 

Similar to Permissions designed to scale

Ferraz Ia252 Developing An Information Architecture
Ferraz Ia252 Developing An Information ArchitectureFerraz Ia252 Developing An Information Architecture
Ferraz Ia252 Developing An Information Architecture
mferraz
 
Share point online 미리보기
Share point online 미리보기Share point online 미리보기
Share point online 미리보기
Jeong-woo Choi
 
Easy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 UsmanEasy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 Usman
Usman Zafar Malik
 
Easy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 UsmanEasy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 Usman
Usman Zafar Malik
 
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information SecurityFerraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Security
mferraz
 
Social networking app to trade user belongings
Social networking app to trade user belongingsSocial networking app to trade user belongings
Social networking app to trade user belongings
Mike Taylor
 
Social networking app to trade user belongings
Social networking app to trade user belongingsSocial networking app to trade user belongings
Social networking app to trade user belongings
Mike Taylor
 

Similar to Permissions designed to scale (20)

Ferraz Ia252 Developing An Information Architecture
Ferraz Ia252 Developing An Information ArchitectureFerraz Ia252 Developing An Information Architecture
Ferraz Ia252 Developing An Information Architecture
 
Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013
 
SharePoint 101 @ #SPSVB
SharePoint 101 @ #SPSVBSharePoint 101 @ #SPSVB
SharePoint 101 @ #SPSVB
 
Give Your SharePoint Site a Physical
Give Your SharePoint Site a PhysicalGive Your SharePoint Site a Physical
Give Your SharePoint Site a Physical
 
SharePoint 101
SharePoint 101SharePoint 101
SharePoint 101
 
MOSS2007 Security
MOSS2007 SecurityMOSS2007 Security
MOSS2007 Security
 
The Shift from Centralized to Decentralized #SPSVB
The Shift from Centralized to Decentralized #SPSVBThe Shift from Centralized to Decentralized #SPSVB
The Shift from Centralized to Decentralized #SPSVB
 
Share point online 미리보기
Share point online 미리보기Share point online 미리보기
Share point online 미리보기
 
Easy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 UsmanEasy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 Usman
 
Easy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 UsmanEasy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 Usman
 
D Cornell Securing Share Point
D Cornell Securing Share PointD Cornell Securing Share Point
D Cornell Securing Share Point
 
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information SecurityFerraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Security
 
Social networking app to trade user belongings
Social networking app to trade user belongingsSocial networking app to trade user belongings
Social networking app to trade user belongings
 
Social networking app to trade user belongings
Social networking app to trade user belongingsSocial networking app to trade user belongings
Social networking app to trade user belongings
 
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
 
Sp2010success
Sp2010successSp2010success
Sp2010success
 
Sp2013 communities
Sp2013 communitiesSp2013 communities
Sp2013 communities
 
Microsoft SharePoint in the Workplace
Microsoft SharePoint in the WorkplaceMicrosoft SharePoint in the Workplace
Microsoft SharePoint in the Workplace
 
Sharepoint 2010 overview - what it is and what it can do
Sharepoint 2010 overview - what it is and what it can doSharepoint 2010 overview - what it is and what it can do
Sharepoint 2010 overview - what it is and what it can do
 
SharePoint 2010 Basics for newbies
SharePoint 2010 Basics for newbiesSharePoint 2010 Basics for newbies
SharePoint 2010 Basics for newbies
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 

Permissions designed to scale

  • 1. Permissions: Designed to Scale Jamie Aliperti jamie.aliperti@axceler.com @jaliperti SharePoint Saturday Portland May 19th, 2012
  • 2. About Me Sales Engineering Manager Axceler based out of the Los Angeles office, and spend most of my time providing consultancy, training and support to current and future customers. I have over 7 years experience with Microsoft technologies, and lead the Los Angeles Sales Engineering team. Email: Jamie.Aliperti@axceler.com Twitter: @jaliperti
  • 3. About Axceler Improving SharePoint Collaboration Since 2007 Mission: To enable enterprises to simplify, optimize, and secure their collaborative platforms Delivered award-winning administration and migration software since 1994 Over 2,000 global customers Dramatically improve the management of SharePoint Innovative products that improve security, scalability, reliability, “deployability” Making IT more effective and efficient and lower the total cost of ownership Focus on solving specific SharePoint problems (Administration & Migration) Coach enterprises on SharePoint best practices Give administrators the most innovative tools available Anticipate customers’ needs Deliver best of breed offerings Stay in lock step with SharePoint development and market trends
  • 4. SharePoint Security Where to Start? Anyone have any ideas?
  • 5. Design Permissions as part of Governance Governance is about taking action to help your organization organize, optimize, and manage your systems and resources.
  • 6. Questions to Ask How is your organization using SharePoint? Is there secure content in your SharePoint environment? Who is responsible for SharePoint Security? 5/30/2012
  • 7. Plan! How granular do you need to control access to content? Who manages all the different parts of your SharePoint farm? How do you want to manage your users?
  • 8. Farm Administrators Group Assigned in Central Admin and has permission to all servers and settings in the farm Central Administration access, create new web apps, manage services, stsadm/PowerShell command Can take ownership of content: make themselves Site Collection Administrators 5/30/2012
  • 9. Authentication Methods A SharePoint environment must support user accounts that can be authenticated by a trusted authority How do you authenticate your users?
  • 10. Windows Authentication  NTLM:  Users authenticated by using the credentials on the running thread  Simple to implement  SharePoint will not be integrated with other applications  Kerberos  If your SharePoint sites use external data  Credentials passed from one server to another (“double hop”)  Faster, more secure, and can be less error prone then NTLM  Anonymous Access  No authentication needed to browse the site
  • 11. SharePoint Authentication Defined at the web application level
  • 12. Who Needs to Access SharePoint? Claims-based authentication mode: use any supported authentication method or else you will support only Windows authentication 5/30/2012
  • 13. Web Application Policies Quick way to apply permissions across web applications Only part of SharePoint where users can be explicitly denied access Set in Central Admin 5/30/2012
  • 14. Site Collection Administrators Given full control over all sites in a site collection Access to settings pages Manage users, restores items, manage site hierarchy Cannot access Central Admin 5/30/2012
  • 15. Securable Objects What can we secure? Site Library or List Folder Document or Item
  • 16. Inheritance If all sites and site content inherit those permissions defined at the site collection, what’s so hard about managing permissions if they are defined so high in the hierarchy?
  • 17. Structure/Architecture Sub-site Site Sub-site Site Site Collection Web App Site Sub-site Site Site Farm Collection Site Site Web App Collection Site Sub-site
  • 18. Permission Levels Collections of permissions that allow users to perform a set of related tasks Permission levels are defined at the site collection level
  • 19. Customizing Permission Levels The default permission levels are Full Control, Design, Contribute, Read, and Limited Access What does “Read” mean to your organization? 5/30/2012
  • 20. SharePoint Groups A group of users that are defined at site collection level for easy management of permissions The default SharePoint groups are Owners, Visitors, and Members, with Full Control, Read, and Contribute as their default permission levels respectively Anyone with Full Control permission can create custom groups 5/30/2012
  • 21. The Basics: Permissions Permissions are applied on objects: 1. Directly to users 2. Directly to domain groups (visibility warning) 3. To SharePoint Groups
  • 22. Best Practice Make most users members of the Members or Visitors groups  Members group can contribute to the site by adding or removing items or documents, but cannot change the structure, site settings, or appearance of the site.  Visitors group has read-only access to the site, which means that they can see pages and items, and open items and documents, but cannot add or remove pages, items, or documents. 5/30/2012
  • 23. Plan for Permission Inheritance Arrange sites and subsites, and lists and libraries so they can share most permissions Separate sensitive data into their own lists, libraries, or subsite Permission worksheet: http://go.microsoft.com/fwlink/p/?LinkID=213970&clcid=0x409 5/30/2012
  • 24. Stick to the Plan If you do break inheritance, Microsoft recommends using groups to avoid having to track individual users People move in and out of teams and change responsibilities frequently Tracking those changes and updating the permissions for uniquely secured objects would be time-consuming and error-prone. 5/30/2012
  • 25. Go back and refine
  • 27. Contact us for more info Contact me: jamie.aliperti@axceler.com Twitter@jaliperti

Editor's Notes

  1. Who has one? Not a checklist…it’s constantly changing every day and needs to be managed in the long term
  2. Currently, is SharePoint a document repository? Is it critical to day to day business?Just internal users? Are there ways you can expand the use of SharePoint to offer more benefits to your organization? To partners? To the outside world?
  3. Who do you trust to manage all the different parts of your SharePoint farm?
  4. - Kerberos: Less traffic between servers, clients, and domain controllers- uses tickets instead of tokens so it doesn’t have to do a double hop to AD with each requestMuch more planning needed Anonymous: Instead, add the all Authenticated users security instead. This way actions can be traced to users.
  5. CB lead, MG color
  6. Break the inheritance and customize the Read permission level for a subsite to define what “read” really means to your organization