AUTHENTICATION, AUTHORIZ
ATION AND IDENTITY…
IT’S MORE THAN MEETS THE EYE
Scott Hoag and Dan Usher
PRINCETON SHAREPOINT USER GROUP
• Different SharePoint discussions each
month on various topics. Announced on
meetup.com
• Meets 4th Wednesday of every month
• 6pm – 8pm
• Infragistics Office
• 2 Commerce Drive, Cranbury, NJ
• http://www.meetup.com/princetonSUG
• http://www.princetonsug.com
THANK YOU
EVENT
SPONSORS
• Platinum & Gold sponsors
have tables here in the
Fireside Lounge
• Please visit them and
inquire about their
products & services
• To be eligible for prizes
make sure your bingo card
is signed by all
Platinum/Gold
WHO ARE WE?
Scott Hoag
@ciphertxt
Applied Information Sciences
Infrastructure Consultant
scott.hoag@appliedis.com
• Dan Usher
• @binarybrewery
• Booz Allen Hamilton Incorporated
• Lead Associate
• usher_daniel@bah.com
HOUSEKEEPING
• Phones silenced, phasers set to stun
• Ask questions
• Please remember to turn in your filled out bingo cards and event evaluations for prizes.
• Follow SharePoint Saturday New Jersey on Twitter @spsnj and hashtag #spsnj
• Do not feed Scott donuts…
THINGS TO COVER
THINGS WE WON’T BE COVERING
http://go.spdan.com/kerberos2010
http://go.spdan.com/kerberos2013
http://go.spdan.com/multihopwinrm
SECURITY
SPOILER ALERT!!!
http://xkcd.com/1240/
SECURITY IN GENERAL
SECURITY IN GENERAL
SECURITY CONCERNS IN TODAY’S WORLD
IDENTIFICATION – WHAT IS?
IDENTIFICATION – TYPES OF…
HOW DO WE PROTECT IDENTITY?
AUTHENTICATION – WHAT IS?
AUTHORIZATION – WHAT IS?
• The act of authorizing.
• Permission or power granted by an authority; sanction.
• To give authority or official power to.
• To give authority for; formally sanction (an act or
proceeding).
• To establish by authority or usage.
• Sometimes we call it AuthZ.
SECURITY WITH SHAREPOINT
SECURITY WITH SHAREPOINT
AUTHN – TYPES OF…
• Windows
• NTLM/Kerberos
• Basic
• Anonymous
• Digest
• Client Certificate
• Forms-based Authentication
• Lightweight Directory Access
Protocol (LDAP)
• Microsoft SQL Server
• ASP.NET Membership and Role
Providers
AUTHN – STILL MORE TYPES OF…
• SAML Token-based Authentication
• Active Directory Federated Services
• 3rd Party Identity Provider
• Lightweight Directory Access Protocol (LDAP)
AUTHENTICATION VS. AUTHORIZATION
AUTHN VS. AUTHZ (CONTINUED)
AUTHENTICATION – CLAIM TERMINOLOGY
• Identity
• Info about a Person or Object
(AD, Google, Windows Live, Facebook
etc.)
• Claim
• Attributes of the Identity (User
ID, Email, Age etc.)
• Token
• Binary Representation of Identity
• Set of Claims and the Signature
• Relying Party (aka RP)
• Users Token
• Secure Token Service (STS)
• Issuer of Tokens for Users
• SharePoint 2010 Introduced Claims
Authentication
• What is this? http://go.spdan.com/cba
AUTHENTICATION - CLAIMS
AUTHENTICATION - CLAIMS
WHAT ABOUT CLAIMS IN WINDOWS?
WHAT DOES CLAIMS ENCODING LOOK LIKE?
http://go.spdan.com/claimsencoding
WHAT DOES CLAIMS ENCODING LOOK LIKE?
http://go.spdan.com/claimsencoding
BASICS OF SHAREPOINT CLASSIC AUTHN
Source:http://go.spdan.com/iisauth
ASP.NETAuthentication
BASICS OF SHAREPOINT CLAIMS AUTHN
1. Resource Requested
2. AuthN Request / Redirect
3. AuthN Request
4. Security Token
5. Security Token Request
6. Service Token
7. Resource Request w/Service Token
8. Resource Sent
Identity Provider
Security Token Service
aka IP-STS
SharePoint 2010
aka RP
SIDE STORY
A SHAREPOINT CONSULTANTS ENTER A BAR…
AUTHN - MEMBERSHIP & ROLE PROVIDERS
AUTHN - MEMBERSHIP & ROLE PROVIDERS
AUTHN – CUSTOM IDENTITY PROVIDER
AUTHN – CUSTOM IDENTITY PROVIDER
AUTHN - PROXY SERVER
AUTHN - DIRECT ACCESS
WINDOWS AZURE ACTIVE DIRECTORY
WINDOWS AZURE ACTIVE DIRECTORY
IDENTITY PROVIDERS
https://sts.domain.com
AUTHZ
SHAREPOINT AUTHZ
Anonymous
Authentication
Is In Site Group?
Does user have claim attribute?
Web Application / Site Collection
Secured Site / Site Collection / Content
Content Repository
Content
AUTHZ - LIMITING ACCESS CONTROL
AUTHZ - OFFICE 365 AND EXTERNAL USERS
AUTHZ - OFFICE 365 AND EXTERNAL USERS
EXPECT THE UNEXPECTED
REAL WORLD
WHAT DO I DO WHERE?
SECURITY IN THE REAL WORLD
• Expect the unexpected
• People will find a way to circumvent your
security
• Give users minimal permission
• Starting with Less is good
• Add functionality through permission as
needed
• Be prepared to secure at all levels
• Web Application
• Site Collection
• Site
• List or Library
• Item
• Use roles from Provider
• Active Directory Groups
• Membership and Role Provider Roles
• Claims
QUESTIONS
CATCH UP WITH US…
Usher_Daniel@bah.com
@binarybrewery
www.sharepointdan.com
Scott.hoag@appliedis.com
@ciphertxt
http://psconfig.com
THANK YOU
EVENT
SPONSORS
• Platinum & Gold sponsors
have tables here in the
Fireside Lounge
• Please visit them and
inquire about their
products & services
• To be eligible for prizes
make sure your bingo card
is signed by all
Platinum/Gold

Authentication, Authorization, and Identity – More than meets the eye…

Editor's Notes