Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Pushing	the	Boundaries	
Real-World	SharePoint	Add-In	Development
@eshupps sharepointcowboywww.sharepointcowboy.com
slideshare.net/eshupps linkedin.com/in/eshupps
Eric	Shupps
SharePoint	Se...
Agenda
What	Works What	Doesn’t
What	Doesn’tWhat	Works
What	Works What	Doesn’t
PermissionsAuthorizationAuthentication
PermissionsAuthorizationAuthentication
PermissionsAuthorizationAuthentication
App	Web
• Not	primary	user	
context
• Declarative	artifacts	or	
code
• Iterative	deployments	
destroy	content
• Only	provi...
• On-Premise
• Modify	and	manipulate	– do	not	replace
Master	Pages
•PHA:	External	(CDN)
•SPHA:	External	or	App	Web
Depende...
Data	Sources
• Lists
• Managed	
Metadata
• Search
• BCS
• External
Components
• Master	Pages
• Client	Web	Parts
• Scripts
What	Works What	Doesn’t
• Apps
• SSL
• DNS
• [PHA]	Server	to	Server	(S2S)	High	Trust	or	Hybrid Low	Trust
Configuration
• [SHA]	None
• [PHA]	Server...
• Apps
Configuration
• [SHA]	None
• [PHA]	Servers, Networking,	Authentication,	Admin	Access
Resources
• Corporate	Catalog
...
• AD	Apps
• SSL
• DNS
• SSO
• Permissions
Configuration
•Servers, Networking,	Authentication,	Admin	Access
•Azure	AD	Premi...
Pushing the boundaries   a deep-dive into real-world share point add-in and app development
Pushing the boundaries   a deep-dive into real-world share point add-in and app development
Pushing the boundaries   a deep-dive into real-world share point add-in and app development
Pushing the boundaries   a deep-dive into real-world share point add-in and app development
Pushing the boundaries   a deep-dive into real-world share point add-in and app development
Pushing the boundaries   a deep-dive into real-world share point add-in and app development
Pushing the boundaries   a deep-dive into real-world share point add-in and app development
Pushing the boundaries   a deep-dive into real-world share point add-in and app development
Pushing the boundaries   a deep-dive into real-world share point add-in and app development
Pushing the boundaries   a deep-dive into real-world share point add-in and app development
Pushing the boundaries   a deep-dive into real-world share point add-in and app development
Pushing the boundaries   a deep-dive into real-world share point add-in and app development
Pushing the boundaries   a deep-dive into real-world share point add-in and app development
Pushing the boundaries   a deep-dive into real-world share point add-in and app development
Upcoming SlideShare
Loading in …5
×

Pushing the boundaries a deep-dive into real-world share point add-in and app development

324 views

Published on

Presented at SharePoint TechFest Houston 2015. All rights reserved.

Published in: Software
  • Be the first to comment

  • Be the first to like this

Pushing the boundaries a deep-dive into real-world share point add-in and app development

  1. 1. Pushing the Boundaries Real-World SharePoint Add-In Development
  2. 2. @eshupps sharepointcowboywww.sharepointcowboy.com slideshare.net/eshupps linkedin.com/in/eshupps Eric Shupps SharePoint Server MVP
  3. 3. Agenda
  4. 4. What Works What Doesn’t
  5. 5. What Doesn’tWhat Works
  6. 6. What Works What Doesn’t
  7. 7. PermissionsAuthorizationAuthentication
  8. 8. PermissionsAuthorizationAuthentication
  9. 9. PermissionsAuthorizationAuthentication
  10. 10. App Web • Not primary user context • Declarative artifacts or code • Iterative deployments destroy content • Only provisionedvia SPHA or PHA with declarative artifacts Host Web • Code only – no declarative artifacts • Requires Cross Domain calls • Injection remnants difficult to remove
  11. 11. • On-Premise • Modify and manipulate – do not replace Master Pages •PHA: External (CDN) •SPHA: External or App Web Dependencies • On-Premise: Declarative or Programmatic • Online: Programmatic Assets •Do not rely upon remote event receivers •Beware the dangers of injection Retraction
  12. 12. Data Sources • Lists • Managed Metadata • Search • BCS • External Components • Master Pages • Client Web Parts • Scripts
  13. 13. What Works What Doesn’t
  14. 14. • Apps • SSL • DNS • [PHA] Server to Server (S2S) High Trust or Hybrid Low Trust Configuration • [SHA] None • [PHA] Servers, Networking, Authentication, Admin Access Resources •Corporate Catalog •Developer Site •Store Distribution
  15. 15. • Apps Configuration • [SHA] None • [PHA] Servers, Networking, Authentication, Admin Access Resources • Corporate Catalog • Developer Site • Store Distribution
  16. 16. • AD Apps • SSL • DNS • SSO • Permissions Configuration •Servers, Networking, Authentication, Admin Access •Azure AD Premium* Resources • Admin assignment Distribution

×