SlideShare uma empresa Scribd logo
1 de 42
HAD05
Collaborating with Extranet
Partners on SharePoint 2010
        Michael Noel
           CCO
       @MichaelTNoel
Michael Noel
•   Author of SAMS Publishing titles “SharePoint 2010 Unleashed,” “SharePoint
    2007 Unleashed,” “SharePoint 2003 Unleashed”, “Teach Yourself SharePoint
    2003 in 10 Minutes,” “Windows Server 2008 R2 Unleashed,” “Exchange Server
    2010 Unleashed”, “ISA Server 2006 Unleashed”, and many other titles .
•   Partner at Convergent Computing (www.cco.com / +1(510)444-5700) – San
    Francisco Bay Area based Infrastructure/Security specialists for SharePoint,
    AD, Exchange, Security
What we’ll cover
• Why an Extranet?
• SharePoint 2010 Extranets
• Extranet Architecture Options
• Claims-based Authentication
• Forefront Unified Access Gateway (UAG)
  for extranets
• Forefront Identity Manager for Identity
  Management in an Extranet
Why an Extranet?
Why an Extranet?

• Security Isolation
  ●   Isolation of Data
  ●   Less Exposure, Perimeter Network Scenarios
• Partner Collaboration
  ●   Share SP Content with External Partners
  ●   Control Partner Accounts

  Anonymous Customer Scenarios are not
  Extranets
SharePoint 2010 Extranets

• Claims-based Authentication Support
• Multiple Authentication Providers
• Better Scalability (Services Architecture)
  ●   Goodbye SSP!
  ●   Server Groups
  ●   Services Applications
• Multiple Authentication Types per Web
  Application
Sample Extranet
  Architecture
Design around Security Requirements

•   Scenario 1: Extranet and Internal Users in Single Farm
     ●   1A: Single Web App / Single Site Collection
     ●   1B: Single Web App / Separate Site Collections
     ●   1C: Multiple Web Apps / Content DBs                       Less
     ●   1D: Separate App Pool / Service App Group                Security
•   Scenario 2: Extranet and Internal Users in Single Farm /
    Separate Trusted Forests
•   Scenario 3: Extranet and Internal Users in Multiple Farms /
    One-Way Trust
•   Scenario 4: Extranet an Internal Users in Separate Farms /
    Claims-based Auth for Internal Access to Extranet
•   Scenario 5: Extranet an Internal Users in Separate Farms /     More
    No Access for Internal Accounts to Extranet                   Security
•   Scenario 6: Separate Farms / AD FS Federation for
    Extranet Auth
Extranet Scenario 1:
Extranet and Internal Users in Single Farm



                               1A: Single Web App / Single Site Collection
                               1B: Single Web App / Separate Site
                               Collections
                               1C: Multiple Web Apps / Content DBs
                               1D: Separate App Pool / Service App Group
Extranet Scenario 2:
Extranet and Internal Users in Single Farm / Separate Trusted
Forests
Extranet Scenario 3:
Extranet and Internal Users in Multiple Farms and Perimeter
Network / One-Way Trust
Extranet Scenario 4:
Extranet an Internal Users in Separate Farms
/ Claims-based Auth Provider for Internal Auth to Extranet
Extranet Scenario 5:
Extranet an Internal Users in Separate Farms / No Access
for Internal Accounts to Extranet
Extranet Scenario 6:
Separate Farms / AD FS Federation for Extranet Auth
Extranet Notes
One-Way Trust Scenarios
• People Picker needs to be configured to crawl domain if it doesn‟t
  trust the domain where the SharePoint farm is installed.
• Only with STSADM (Rare exception when you can‟t use
  PowerShell)
• Example Syntax:
    ●   stsadm.exe -o setapppassword -password AnyPassw0rd
    ●   stsadm.exe -o setproperty -pn peoplepicker-searchadforests -pv
        "domain:companyabc.com,COMPANYABCsvc_sppplpick,Password1;d
        omain:extranetabc.com" -url https://extranet.companyabc.com
    ●   stsadm.exe -o setproperty -pn peoplepicker-searchadforests -pv
        "domain:companyabc.com,COMPANYABCsvc_sppplpick,Password1;d
        omain:extranetabc.com" -url https://spcaext.companyabc.com
• Syntax is critical
• Run against all web apps
Design for Clientless Access to
SharePoint
• Services Applications for Extranet Clients:
  ●   Word Services
  ●   Excel Services
  ●   Visio Services
  ●   Access Services
  ●   InfoPath Forms Services
• Allows „Clientless‟ access to SharePoint
  content, for Extranet partners without
  Office
Standard Requirements Apply to Extranets as
well

• SharePoint-aware Antivirus
  ●   i.e. Forefront Protection for SharePoint
• SharePoint-aware Backup and Restore
  ●   i.e. System Center Data Protection Manager
      (DPM) 2010
• Rights Management?
  ●   Active Directory Rights Management Services
      (AD RMS)
Content Deployment with Extranets
Claims-based
Authentication
Claims-Based Auth
• SharePoint doesn‟t actually Authenticate Users, it relies on IIS or
  other providers
• SharePoint 2010 Allows for Classic and Claims-based Auth
  Scenarios
• Classic Authentication is similar to SharePoint 2007
• Claims based Auth adds the following key benefits:
    ●   Allows for Multiple Authentication Types per Web Application Zone
    ●   Removes SharePoint from the Authentication Provider
    ●   Allows for federation between organizations (AD FS, etc.) scenarios
    ●   Does not require Kerberos Delegation
• Current limitations with Claims-based auth involve SQL Reporting
  Services, PowerPivot, PerformancePoint, and other SQL tools that
  require delegation. These appear to be fixed in SQL 2012.
• Remember the difference between Authentication and
  Authorization…
Classic vs. Claims-based Auth
                                                     Claims-based
                                      Classic-mode
Type                                  authentication
                                                     authenticatio
                                                     n
Windows
   NTLM
   Kerberos
                                      Yes           Yes
   Anonymous
   Basic
   Digest
Forms-based authentication
   LDAP
   SQL database or other database     No            Yes
   Custom or third-party membership
   and role providers
SAML token-based authentication
   AD FS 2.0
                                      No            Yes
   Third-party identity provider
   LDAP
Mixed-Mode vs. Multi-Authentication
Example: Partner Environment with
Multiple Auth Types on single W.A.
Forefront Unified Access
        Gateway
UAG Architecture                          Data Center / Corporate Network

                                                                 Exchange
                                                                 CRM
                      Mobile                                     SharePoint
                                                                 IIS based
                                                                 IBM, SAP, Oracle
Home / Friend
  / Kiosk                        Layer3 VPN
                                                                 Terminal / Remote
                                 HTTPS (443)
                      Internet                                   Desktop Services
                                 DirectAccess

                                                                 Non web



Business Partners /                                          AD, ADFS,
 Sub-Contractors                                             RADIUS, LDAP….

                                                               NPS, ILM

  Employees Managed Machines
What about TMG? (New ISA)

Capability                                                                   TMG     UAG
                                                                             2010    2010

Publish Web applications using HTTPS                                         X       X
Publish internal mobile applications to roaming mobile devices               X       X
Layer 3 firewall                                                             X       X*
Outbound scenarios support                                                   X       X*
Array support                                                                X
Globalization and administration console localization                        X
Wizards and predefined settings to publish SharePoint sites and Exchange     X       X
Wizards and predefined settings to publish various applications                      X
Active Directory Federation Services (ADFS) support                                  X
Rich authentication (for example, one-time password, forms-based, smart card) X      X

Application protection (Web application firewall)                            Basic   Full
Endpoint health detection                                                            X
Information leakage prevention                                                       X
Granular access policy                                                               X
Unified Portal                                                                       X
Forefront Identity Manager
Identity and Access Management
  Secure Messaging       Secure Collaboration            Secure Endpoint


                         Information Protection


                     Identity and Access Management




                                                  Active Directory Federation Services
                                                                 ®
Manage SharePoint Identities

• Create Multiple Authentication Providers
  for SharePoint Farms
  ●   AD DS Forests (Extranet forests)
  ●   AD LDS Authentication Providers
  ●   SQL Table (FBA) Authentication Sources
  ●   LDAP Providers
  ●   Etc…
• Keep those Authentication Providers
  Managed
Identity Management
User provisioning for SharePoint and other Applications

 •    Policy-based identity lifecycle management system
 •    Built-in workflow for identity management
 •    Automatically synchronize all user information to different directories across the enterprise
 •    Automates the process of on-boarding users



                                                                          Active
                                                                          Directory



                                                                          Extranet
                                                                          Forest
                                                            Workflow
                        User Enrollment
                                                                          Test
                                                                          Forest

                                                  FIM
     HR System
                                                                          FBA
                                                                          Table
                                           Approval


                                                                          LOB
 User provisioned on all allowed systems                                  App



                                                        Manager           VPN
Identity Management
User de-provisioning
    • Automated user de-provisioning
    • Built-in workflow for identity management
    • Real-time de-provisioning from all systems to prevent unauthorized access
      and information leakage



                                                                        Active
                                                                        Directory



                                                                        Extranet
                                                                        Forest
                                                             Workflow

                         User de-provisioned                            Test
                                                                        Forest

                                                       FIM
     HR System
                                                                        FBA
                                                                        Table



                                                                        LOB
      User de-provisioned or disabled on all systems                    App



                                                                        VPN
Identity Synchronization and Consistency
Identity synchronization across multiple directories


    Attribute
                    HR         givenName Samantha
   Ownership
                    System     sn         Dearing                 FIM
                               title
                               mail
     FirstName
                               employeeID 007
     LastName                  telephone
    EmployeeID                                                    GivenName
                                                                  givenName    Samantha
                                                                  sn           Dearing
                                                                  title        Coordinator
                    Internal   givenName    Samara
                                                                  mail         someone@example.com
                    AD         sn
                               title
                                            Darling
                                            Coordinator
                                                                  employeeID   007
                                                                  telephone    555-0129
                               mail
           Title
                               employeeID   007
                               telephone

                                                                    Identity
                    Extranet
                                                                      Data
                               givenName    Sam
                    AD         sn           Dearing
                               title        Intern
         E-Mail                mail
                               employeeID
                                            someone@example.com
                                            007                   Aggregation
                               telephone



                    LDAP       givenName    Sammy
                               sn           Dearling
                               title
                               mail
     Telephone
                               employeeID   008
                               telephone    555-0129
Identity Synchronization and Consistency
Identity consistency across multiple directories


    Attribute
                   HR          givenName Samantha
   Ownership
                   System      sn         Dearing                 FIM
                               title
                               mail
     FirstName
                               employeeID 007
     LastName                  telephone
    EmployeeID                                                    givenName    Samantha
                                                                               Bob
                                                                  sn           Dearing
                                                                  title        Coordinator
                   Internal    givenName    Samara
                                                                  mail         someone@example.com
                                                                               someone@example.com
                   AD          sn
                               title
                                            Darling
                                            Coordinator
                                                                  employeeID   007
                                                                  telephone    555-0129
                               mail
           Title
                               employeeID   007
                               telephone

                                                                      Identity
                   Extranet
                                                                        Data
                               givenName    Sam

                   AD          sn
                               title
                                            Dearing
                                            Intern
         E-Mail                mail
                               employeeID
                                            someone@example.com
                                            007                      Brokering
                               telephone
                                                                    (Convergence)
                   LDAP        givenName    Sammy
                               sn           Dearling
                               title
                               mail
     Telephone
                               employeeID   007
                               telephone    555-0129
Customizable Identity Portal
SharePoint-based Identity Portal
for Management and Self Service

                                   How you extend it
                                    Add your own portal pages
                                    or web parts
                                    Build new custom solutions
                                    Expose new attributes to manage by
                                    extending FIM schema
                                    Choose SharePoint theme to
                                    customize look and feel
Strong Authentication—Certificate Authority
              • Streamline deployment by enrolling user and computer certificates
                  without user intervention
              •   Simplify certificate and SmartCard management using Forefront
                  Identity Manager (FIM)
              •   Can be used to automate Certificate management for dual factor auth
                  approaches to SharePoint logins



                                             End User SmartCard

                                                                        User is validated using multi-
       FIM policy triggers request for                                  factor authentication
       FIM CM to issue certificate or
     Certificate is issued to user and
       SmartCard
     written to either machine or
     smart card


                                                           FIM CM

                                                                                                                       End User
                                                                                                         SmartCard
                        FIM
HR System
          FIM Certificate Management
          (CM) requests certificate                                                                      User ID and
 User Enrollment and AD CS
          creation from
 Authentication request sent by                                                                           Password
 HR System

                                         Active Directory Certificate
                                              Services (AD CS)
FIM for Extranet Forest Mgmt

• Internal AD DS Forest
• DMZ Extranet AD DS Forest
• FIM Auto-provisions certain user accounts in Extranet
  forest and keeps Passwords in Sync to allow Internal
  users to access/collaborate with Partners
• FIM allows Self-Service Portal Access for Extranet user
  accounts in the partner forest
• Two-factor Auth scenarios, to automate provisioning of
  user accounts AND certificates to systems
FIM for Role Based Access Control

•   FIM is central to RBAC Strategy
•   Can auto-add users to Groups based on RBAC Criteria
•   HR Defines a user‟s access based on their role
•   FIM auto-adds that user to specific Role Groups in AD
    DS, which are tied to SharePoint Groups that have the
    rights that that role group requires.

           User1

                      Role                     SharePoint
                      Group                      Group

           User2
Session Summary

• Understand the Extranet Design Options for
  2010
• Keep Extranet Accounts out of local AD
• Determine how Identities will be Managed
• Use FIM for Identity Management, Self-Service,
  and Provisioning/Deprovisioning of Extranet
  Accounts
• Use UAG to secure inbound access to
  extranets/intranets
Your Feedback is Important

 Please fill out a session evaluation form
  drop it off at the conference registration
                      desk.

                Thank you!
Michael Noel
     Twitter: @MichaelTNoel
            www.cco.com
Slides: slideshare.net/michaeltnoel

Mais conteúdo relacionado

Mais procurados

Office 365: Planning and Automating for Hybrid Identity Scenarios in the Clou...
Office 365: Planning and Automating for Hybrid Identity Scenarios in the Clou...Office 365: Planning and Automating for Hybrid Identity Scenarios in the Clou...
Office 365: Planning and Automating for Hybrid Identity Scenarios in the Clou...Microsoft TechNet - Belgium and Luxembourg
 
Leveraging SharePoint for Extranets
Leveraging SharePoint for ExtranetsLeveraging SharePoint for Extranets
Leveraging SharePoint for ExtranetsAvtex
 
Supporting architecture for office 365 spo
Supporting architecture for office 365 spoSupporting architecture for office 365 spo
Supporting architecture for office 365 spoJethro Seghers
 
[Infosecworld 08 Orlando] New Defenses for .NET Web Apps: IHttpModule in Prac...
[Infosecworld 08 Orlando] New Defenses for .NET Web Apps: IHttpModule in Prac...[Infosecworld 08 Orlando] New Defenses for .NET Web Apps: IHttpModule in Prac...
[Infosecworld 08 Orlando] New Defenses for .NET Web Apps: IHttpModule in Prac...Shreeraj Shah
 
SharePoint 2010 anywhere access uag vs dmz
SharePoint 2010 anywhere access uag vs dmz SharePoint 2010 anywhere access uag vs dmz
SharePoint 2010 anywhere access uag vs dmz Kjell-Sverre Jerijærvi
 
Gartner Catalyst Savvis Cloud API Case Study
Gartner Catalyst   Savvis Cloud API Case StudyGartner Catalyst   Savvis Cloud API Case Study
Gartner Catalyst Savvis Cloud API Case StudyCA API Management
 
Extending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partnersExtending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partnersCorey Roth
 
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...Brian Culver
 
“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with EverythingDave Hay
 
Adfs Shib Interop Um Oxford
Adfs Shib Interop Um OxfordAdfs Shib Interop Um Oxford
Adfs Shib Interop Um Oxfordguestd9aa5
 
Alfresco: Implementing secure single sign on (SSO) with OpenSAML
Alfresco: Implementing secure single sign on (SSO) with OpenSAMLAlfresco: Implementing secure single sign on (SSO) with OpenSAML
Alfresco: Implementing secure single sign on (SSO) with OpenSAMLJ V
 
Planning Extranet Environments with SharePoint 2010
Planning Extranet Environments with SharePoint 2010Planning Extranet Environments with SharePoint 2010
Planning Extranet Environments with SharePoint 2010Michael Noel
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantoneJose R
 
Presentation sso design_security
Presentation sso design_securityPresentation sso design_security
Presentation sso design_securityMarco Morana
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Anil Saldanha
 
Preparing for Office 365
Preparing for Office 365Preparing for Office 365
Preparing for Office 365Jan Egil Ring
 
sharepoint.microsoft.com
sharepoint.microsoft.comsharepoint.microsoft.com
sharepoint.microsoft.comwebhostingguy
 

Mais procurados (20)

Office 365: Planning and Automating for Hybrid Identity Scenarios in the Clou...
Office 365: Planning and Automating for Hybrid Identity Scenarios in the Clou...Office 365: Planning and Automating for Hybrid Identity Scenarios in the Clou...
Office 365: Planning and Automating for Hybrid Identity Scenarios in the Clou...
 
Leveraging SharePoint for Extranets
Leveraging SharePoint for ExtranetsLeveraging SharePoint for Extranets
Leveraging SharePoint for Extranets
 
Supporting architecture for office 365 spo
Supporting architecture for office 365 spoSupporting architecture for office 365 spo
Supporting architecture for office 365 spo
 
[Infosecworld 08 Orlando] New Defenses for .NET Web Apps: IHttpModule in Prac...
[Infosecworld 08 Orlando] New Defenses for .NET Web Apps: IHttpModule in Prac...[Infosecworld 08 Orlando] New Defenses for .NET Web Apps: IHttpModule in Prac...
[Infosecworld 08 Orlando] New Defenses for .NET Web Apps: IHttpModule in Prac...
 
SharePoint 2010 anywhere access uag vs dmz
SharePoint 2010 anywhere access uag vs dmz SharePoint 2010 anywhere access uag vs dmz
SharePoint 2010 anywhere access uag vs dmz
 
Gartner Catalyst Savvis Cloud API Case Study
Gartner Catalyst   Savvis Cloud API Case StudyGartner Catalyst   Savvis Cloud API Case Study
Gartner Catalyst Savvis Cloud API Case Study
 
Extending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partnersExtending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partners
 
Adfs azure
Adfs azureAdfs azure
Adfs azure
 
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
 
“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything
 
Adfs Shib Interop Um Oxford
Adfs Shib Interop Um OxfordAdfs Shib Interop Um Oxford
Adfs Shib Interop Um Oxford
 
Alfresco: Implementing secure single sign on (SSO) with OpenSAML
Alfresco: Implementing secure single sign on (SSO) with OpenSAMLAlfresco: Implementing secure single sign on (SSO) with OpenSAML
Alfresco: Implementing secure single sign on (SSO) with OpenSAML
 
Planning Extranet Environments with SharePoint 2010
Planning Extranet Environments with SharePoint 2010Planning Extranet Environments with SharePoint 2010
Planning Extranet Environments with SharePoint 2010
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantone
 
Presentation sso design_security
Presentation sso design_securityPresentation sso design_security
Presentation sso design_security
 
Ad fs
Ad fsAd fs
Ad fs
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?
 
Preparing for Office 365
Preparing for Office 365Preparing for Office 365
Preparing for Office 365
 
Deploying Exchange 2013 in Hybrid Mode
Deploying Exchange 2013 in Hybrid ModeDeploying Exchange 2013 in Hybrid Mode
Deploying Exchange 2013 in Hybrid Mode
 
sharepoint.microsoft.com
sharepoint.microsoft.comsharepoint.microsoft.com
sharepoint.microsoft.com
 

Semelhante a HAD05: Collaborating with Extranet Partners on SharePoint 2010

Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...
Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...
Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...SPTechCon
 
Planning and Configuring Extranets in SharePoint 2010
Planning and Configuring Extranets in SharePoint 2010Planning and Configuring Extranets in SharePoint 2010
Planning and Configuring Extranets in SharePoint 2010Geoff Varosky
 
A great api is hard to find
A great api is hard to findA great api is hard to find
A great api is hard to findDan Diephouse
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your AzureHolly Plude
 
Connect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureConnect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureK.Mohamed Faizal
 
SwiftKnowledge Multitenancy
SwiftKnowledge MultitenancySwiftKnowledge Multitenancy
SwiftKnowledge MultitenancyPivotLogix
 
InduSoft Remote Production Monitoring Webinar
InduSoft Remote Production Monitoring WebinarInduSoft Remote Production Monitoring Webinar
InduSoft Remote Production Monitoring WebinarAVEVA
 
Deploy, Scale and Manage your Microsoft Investments with AWS
Deploy, Scale and Manage your Microsoft Investments with AWSDeploy, Scale and Manage your Microsoft Investments with AWS
Deploy, Scale and Manage your Microsoft Investments with AWSAmazon Web Services
 
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld
 
Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.sflynn073
 
Citrix Day 2014: ShareFile Enterprise
Citrix Day 2014: ShareFile EnterpriseCitrix Day 2014: ShareFile Enterprise
Citrix Day 2014: ShareFile EnterpriseDigicomp Academy AG
 
Azure Services Platform
Azure Services PlatformAzure Services Platform
Azure Services PlatformDavid Chou
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADuberbaum
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustInformation Security Services SA
 

Semelhante a HAD05: Collaborating with Extranet Partners on SharePoint 2010 (20)

Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...
Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...
Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...
 
Planning and Configuring Extranets in SharePoint 2010
Planning and Configuring Extranets in SharePoint 2010Planning and Configuring Extranets in SharePoint 2010
Planning and Configuring Extranets in SharePoint 2010
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
A great api is hard to find
A great api is hard to findA great api is hard to find
A great api is hard to find
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
Office 365 Identity Management options
Office 365 Identity Management options Office 365 Identity Management options
Office 365 Identity Management options
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
Connect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureConnect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft Azure
 
SwiftKnowledge Multitenancy
SwiftKnowledge MultitenancySwiftKnowledge Multitenancy
SwiftKnowledge Multitenancy
 
InduSoft Remote Production Monitoring Webinar
InduSoft Remote Production Monitoring WebinarInduSoft Remote Production Monitoring Webinar
InduSoft Remote Production Monitoring Webinar
 
Deploy, Scale and Manage your Microsoft Investments with AWS
Deploy, Scale and Manage your Microsoft Investments with AWSDeploy, Scale and Manage your Microsoft Investments with AWS
Deploy, Scale and Manage your Microsoft Investments with AWS
 
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
 
Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.
 
Datapower Steven Cawn
Datapower Steven CawnDatapower Steven Cawn
Datapower Steven Cawn
 
Citrix Day 2014: ShareFile Enterprise
Citrix Day 2014: ShareFile EnterpriseCitrix Day 2014: ShareFile Enterprise
Citrix Day 2014: ShareFile Enterprise
 
Azure Services Platform
Azure Services PlatformAzure Services Platform
Azure Services Platform
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 

Mais de Michael Noel

AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...Michael Noel
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024Michael Noel
 
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023Michael Noel
 
IT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital BrazzavilleIT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital BrazzavilleMichael Noel
 
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...Michael Noel
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018Michael Noel
 
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep DiveSPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep DiveMichael Noel
 
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 MelbourneAzure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 MelbourneMichael Noel
 
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018Michael Noel
 
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018Michael Noel
 
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...Michael Noel
 
Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017Michael Noel
 
Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée Michael Noel
 
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...Michael Noel
 
Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015Michael Noel
 
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015Michael Noel
 
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...Michael Noel
 
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014Michael Noel
 

Mais de Michael Noel (20)

AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
 
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
 
IT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital BrazzavilleIT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital Brazzaville
 
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018
 
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep DiveSPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
 
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 MelbourneAzure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
 
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
 
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
 
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
 
Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017
 
Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée
 
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
 
Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015
 
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
 
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
 
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

HAD05: Collaborating with Extranet Partners on SharePoint 2010

  • 1. HAD05 Collaborating with Extranet Partners on SharePoint 2010 Michael Noel CCO @MichaelTNoel
  • 2. Michael Noel • Author of SAMS Publishing titles “SharePoint 2010 Unleashed,” “SharePoint 2007 Unleashed,” “SharePoint 2003 Unleashed”, “Teach Yourself SharePoint 2003 in 10 Minutes,” “Windows Server 2008 R2 Unleashed,” “Exchange Server 2010 Unleashed”, “ISA Server 2006 Unleashed”, and many other titles . • Partner at Convergent Computing (www.cco.com / +1(510)444-5700) – San Francisco Bay Area based Infrastructure/Security specialists for SharePoint, AD, Exchange, Security
  • 3. What we’ll cover • Why an Extranet? • SharePoint 2010 Extranets • Extranet Architecture Options • Claims-based Authentication • Forefront Unified Access Gateway (UAG) for extranets • Forefront Identity Manager for Identity Management in an Extranet
  • 5. Why an Extranet? • Security Isolation ● Isolation of Data ● Less Exposure, Perimeter Network Scenarios • Partner Collaboration ● Share SP Content with External Partners ● Control Partner Accounts Anonymous Customer Scenarios are not Extranets
  • 6. SharePoint 2010 Extranets • Claims-based Authentication Support • Multiple Authentication Providers • Better Scalability (Services Architecture) ● Goodbye SSP! ● Server Groups ● Services Applications • Multiple Authentication Types per Web Application
  • 7. Sample Extranet Architecture
  • 8. Design around Security Requirements • Scenario 1: Extranet and Internal Users in Single Farm ● 1A: Single Web App / Single Site Collection ● 1B: Single Web App / Separate Site Collections ● 1C: Multiple Web Apps / Content DBs Less ● 1D: Separate App Pool / Service App Group Security • Scenario 2: Extranet and Internal Users in Single Farm / Separate Trusted Forests • Scenario 3: Extranet and Internal Users in Multiple Farms / One-Way Trust • Scenario 4: Extranet an Internal Users in Separate Farms / Claims-based Auth for Internal Access to Extranet • Scenario 5: Extranet an Internal Users in Separate Farms / More No Access for Internal Accounts to Extranet Security • Scenario 6: Separate Farms / AD FS Federation for Extranet Auth
  • 9. Extranet Scenario 1: Extranet and Internal Users in Single Farm 1A: Single Web App / Single Site Collection 1B: Single Web App / Separate Site Collections 1C: Multiple Web Apps / Content DBs 1D: Separate App Pool / Service App Group
  • 10. Extranet Scenario 2: Extranet and Internal Users in Single Farm / Separate Trusted Forests
  • 11. Extranet Scenario 3: Extranet and Internal Users in Multiple Farms and Perimeter Network / One-Way Trust
  • 12. Extranet Scenario 4: Extranet an Internal Users in Separate Farms / Claims-based Auth Provider for Internal Auth to Extranet
  • 13. Extranet Scenario 5: Extranet an Internal Users in Separate Farms / No Access for Internal Accounts to Extranet
  • 14. Extranet Scenario 6: Separate Farms / AD FS Federation for Extranet Auth
  • 16. One-Way Trust Scenarios • People Picker needs to be configured to crawl domain if it doesn‟t trust the domain where the SharePoint farm is installed. • Only with STSADM (Rare exception when you can‟t use PowerShell) • Example Syntax: ● stsadm.exe -o setapppassword -password AnyPassw0rd ● stsadm.exe -o setproperty -pn peoplepicker-searchadforests -pv "domain:companyabc.com,COMPANYABCsvc_sppplpick,Password1;d omain:extranetabc.com" -url https://extranet.companyabc.com ● stsadm.exe -o setproperty -pn peoplepicker-searchadforests -pv "domain:companyabc.com,COMPANYABCsvc_sppplpick,Password1;d omain:extranetabc.com" -url https://spcaext.companyabc.com • Syntax is critical • Run against all web apps
  • 17. Design for Clientless Access to SharePoint • Services Applications for Extranet Clients: ● Word Services ● Excel Services ● Visio Services ● Access Services ● InfoPath Forms Services • Allows „Clientless‟ access to SharePoint content, for Extranet partners without Office
  • 18. Standard Requirements Apply to Extranets as well • SharePoint-aware Antivirus ● i.e. Forefront Protection for SharePoint • SharePoint-aware Backup and Restore ● i.e. System Center Data Protection Manager (DPM) 2010 • Rights Management? ● Active Directory Rights Management Services (AD RMS)
  • 21. Claims-Based Auth • SharePoint doesn‟t actually Authenticate Users, it relies on IIS or other providers • SharePoint 2010 Allows for Classic and Claims-based Auth Scenarios • Classic Authentication is similar to SharePoint 2007 • Claims based Auth adds the following key benefits: ● Allows for Multiple Authentication Types per Web Application Zone ● Removes SharePoint from the Authentication Provider ● Allows for federation between organizations (AD FS, etc.) scenarios ● Does not require Kerberos Delegation • Current limitations with Claims-based auth involve SQL Reporting Services, PowerPivot, PerformancePoint, and other SQL tools that require delegation. These appear to be fixed in SQL 2012. • Remember the difference between Authentication and Authorization…
  • 22. Classic vs. Claims-based Auth Claims-based Classic-mode Type authentication authenticatio n Windows NTLM Kerberos Yes Yes Anonymous Basic Digest Forms-based authentication LDAP SQL database or other database No Yes Custom or third-party membership and role providers SAML token-based authentication AD FS 2.0 No Yes Third-party identity provider LDAP
  • 24. Example: Partner Environment with Multiple Auth Types on single W.A.
  • 26. UAG Architecture Data Center / Corporate Network Exchange CRM Mobile SharePoint IIS based IBM, SAP, Oracle Home / Friend / Kiosk Layer3 VPN Terminal / Remote HTTPS (443) Internet Desktop Services DirectAccess Non web Business Partners / AD, ADFS, Sub-Contractors RADIUS, LDAP…. NPS, ILM Employees Managed Machines
  • 27.
  • 28. What about TMG? (New ISA) Capability TMG UAG 2010 2010 Publish Web applications using HTTPS X X Publish internal mobile applications to roaming mobile devices X X Layer 3 firewall X X* Outbound scenarios support X X* Array support X Globalization and administration console localization X Wizards and predefined settings to publish SharePoint sites and Exchange X X Wizards and predefined settings to publish various applications X Active Directory Federation Services (ADFS) support X Rich authentication (for example, one-time password, forms-based, smart card) X X Application protection (Web application firewall) Basic Full Endpoint health detection X Information leakage prevention X Granular access policy X Unified Portal X
  • 30. Identity and Access Management Secure Messaging Secure Collaboration Secure Endpoint Information Protection Identity and Access Management Active Directory Federation Services ®
  • 31. Manage SharePoint Identities • Create Multiple Authentication Providers for SharePoint Farms ● AD DS Forests (Extranet forests) ● AD LDS Authentication Providers ● SQL Table (FBA) Authentication Sources ● LDAP Providers ● Etc… • Keep those Authentication Providers Managed
  • 32. Identity Management User provisioning for SharePoint and other Applications • Policy-based identity lifecycle management system • Built-in workflow for identity management • Automatically synchronize all user information to different directories across the enterprise • Automates the process of on-boarding users Active Directory Extranet Forest Workflow User Enrollment Test Forest FIM HR System FBA Table Approval LOB User provisioned on all allowed systems App Manager VPN
  • 33. Identity Management User de-provisioning • Automated user de-provisioning • Built-in workflow for identity management • Real-time de-provisioning from all systems to prevent unauthorized access and information leakage Active Directory Extranet Forest Workflow User de-provisioned Test Forest FIM HR System FBA Table LOB User de-provisioned or disabled on all systems App VPN
  • 34. Identity Synchronization and Consistency Identity synchronization across multiple directories Attribute HR givenName Samantha Ownership System sn Dearing FIM title mail FirstName employeeID 007 LastName telephone EmployeeID GivenName givenName Samantha sn Dearing title Coordinator Internal givenName Samara mail someone@example.com AD sn title Darling Coordinator employeeID 007 telephone 555-0129 mail Title employeeID 007 telephone Identity Extranet Data givenName Sam AD sn Dearing title Intern E-Mail mail employeeID someone@example.com 007 Aggregation telephone LDAP givenName Sammy sn Dearling title mail Telephone employeeID 008 telephone 555-0129
  • 35. Identity Synchronization and Consistency Identity consistency across multiple directories Attribute HR givenName Samantha Ownership System sn Dearing FIM title mail FirstName employeeID 007 LastName telephone EmployeeID givenName Samantha Bob sn Dearing title Coordinator Internal givenName Samara mail someone@example.com someone@example.com AD sn title Darling Coordinator employeeID 007 telephone 555-0129 mail Title employeeID 007 telephone Identity Extranet Data givenName Sam AD sn title Dearing Intern E-Mail mail employeeID someone@example.com 007 Brokering telephone (Convergence) LDAP givenName Sammy sn Dearling title mail Telephone employeeID 007 telephone 555-0129
  • 36. Customizable Identity Portal SharePoint-based Identity Portal for Management and Self Service How you extend it Add your own portal pages or web parts Build new custom solutions Expose new attributes to manage by extending FIM schema Choose SharePoint theme to customize look and feel
  • 37. Strong Authentication—Certificate Authority • Streamline deployment by enrolling user and computer certificates without user intervention • Simplify certificate and SmartCard management using Forefront Identity Manager (FIM) • Can be used to automate Certificate management for dual factor auth approaches to SharePoint logins End User SmartCard User is validated using multi- FIM policy triggers request for factor authentication FIM CM to issue certificate or Certificate is issued to user and SmartCard written to either machine or smart card FIM CM End User SmartCard FIM HR System FIM Certificate Management (CM) requests certificate User ID and User Enrollment and AD CS creation from Authentication request sent by Password HR System Active Directory Certificate Services (AD CS)
  • 38. FIM for Extranet Forest Mgmt • Internal AD DS Forest • DMZ Extranet AD DS Forest • FIM Auto-provisions certain user accounts in Extranet forest and keeps Passwords in Sync to allow Internal users to access/collaborate with Partners • FIM allows Self-Service Portal Access for Extranet user accounts in the partner forest • Two-factor Auth scenarios, to automate provisioning of user accounts AND certificates to systems
  • 39. FIM for Role Based Access Control • FIM is central to RBAC Strategy • Can auto-add users to Groups based on RBAC Criteria • HR Defines a user‟s access based on their role • FIM auto-adds that user to specific Role Groups in AD DS, which are tied to SharePoint Groups that have the rights that that role group requires. User1 Role SharePoint Group Group User2
  • 40. Session Summary • Understand the Extranet Design Options for 2010 • Keep Extranet Accounts out of local AD • Determine how Identities will be Managed • Use FIM for Identity Management, Self-Service, and Provisioning/Deprovisioning of Extranet Accounts • Use UAG to secure inbound access to extranets/intranets
  • 41. Your Feedback is Important Please fill out a session evaluation form drop it off at the conference registration desk. Thank you!
  • 42. Michael Noel Twitter: @MichaelTNoel www.cco.com Slides: slideshare.net/michaeltnoel