SlideShare a Scribd company logo
1 of 46
Platinum Sponsor




 Gold Sponsors
Michael Noel

PLANNING EXTRANETS WITH
        SHAREPOINT 2010
MICHAEL NOEL
•    Author of SAMS Publishing titles ―SharePoint 2007 Unleashed,‖ the upcoming
     ―SharePoint 2010 Unleashed,‖ ―SharePoint 2003 Unleashed‖, ―Teach Yourself
     SharePoint 2003 in 10 Minutes,‖ ―Windows Server 2008 R2 Unleashed,‖ ―Exchange
     Server 2010 Unleashed‖, ―ISA Server 2006 Unleashed‖, and many other titles .
•    Partner at Convergent Computing (www.cco.com / +1(510)444-5700) – San Francisco,
     U.S.A. based Infrastructure/Security specialists for SharePoint, AD, Exchange, Security
WHAT WE‘LL COVER
• Why an Extranet?
• SharePoint 2010 Extranets
• Extranet Architecture Options
• Claims-based Authentication
• Forefront Unified Access Gateway (UAG) for extranets
• Forefront Identity Manager for Identity Management in an
  Extranet
WHY AN EXTRANET?
WHY AN EXTRANET?
• Security Isolation
   • Isolation of Data
   • Less Exposure, Perimeter Network Scenarios

• Partner Collaboration
   • Share SP Content with External Partners
   • Control Partner Accounts


   Anonymous Customer Scenarios are not really Extranets
SHAREPOINT 2010 EXTRANETS
• Claims-based Authentication Support
• Multiple Authentication Providers
• Better Scalability (Services Architecture)
   • Goodbye SSP!
   • Server Groups
   • Services Applications

• Multiple Authentication Types per Web Application
SAMPLE EXTRANET ARCHITECTURE
DESIGN AROUND SECURITY REQUIREMENTS
•   Scenario 1: Extranet and Internal Users in Single Farm
     •   1A: Single Web App / Single Site Collection                       Less
                                                                          Secure
     •   1B: Single Web App / Separate Site Collections
     •   1C: Multiple Web Apps / Content DBs
     •   1D: Separate App Pool / Service App Group
•   Scenario 2: Extranet and Internal Users in Single Farm / Separate
    Trusted Forests
•   Scenario 3: Extranet and Internal Users in Multiple Farms / One-Way
    Trust
•   Scenario 4: Extranet an Internal Users in Separate Farms / Claims-
    based Auth for Internal Access to Extranet
                                                                           More
•   Scenario 5: Extranet an Internal Users in Separate Farms / No         Secure
    Access for Internal Accounts to Extranet
•   Scenario 6: Separate Farms / AD FS Federation for Extranet Auth
EXTRANET SCENARIO 1:
EXTRANET AND INTERNAL USERS IN SINGLE FARM



                            1A: Single Web App / Single Site Collection
                            1B: Single Web App / Separate Site Collections
                            1C: Multiple Web Apps / Content DBs
                            1D: Separate App Pool / Service App Group
EXTRANET SCENARIO 2:
EXTRANET AND INTERNAL USERS IN SINGLE FARM
/ SEPARATE TRUSTED FORESTS
EXTRANET SCENARIO 3:
EXTRANET AND INTERNAL USERS IN MULTIPLE FARMS AND
PERIMETER NETWORK / ONE-WAY TRUST
EXTRANET SCENARIO 4:
EXTRANET AN INTERNAL USERS IN SEPARATE FARMS /
CLAIMS-BASED AUTH PROVIDER FOR INTERNAL AUTH TO
EXTRANET
EXTRANET SCENARIO 5:
EXTRANET AN INTERNAL USERS IN SEPARATE FARMS / NO
ACCESS FOR INTERNAL ACCOUNTS TO EXTRANET
EXTRANET SCENARIO 6:
SEPARATE FARMS / AD FS FEDERATION FOR EXTRANET
AUTH
EXTRANET NOTES
ONE-WAY TRUST SCENARIOS
• People Picker needs to be configured to crawl domain if it doesn‘t trust the
  domain where the SharePoint farm is installed.
• Only with STSADM (Rare exception when you can‘t use PowerShell)
• Example Syntax:
    • stsadm.exe -o setapppassword -password AnyPassw0rd
    • stsadm.exe -o setproperty -pn peoplepicker-searchadforests -pv
      "domain:companyabc.com,COMPANYABCsvc_sppplpick,Password1;domain:extran
      etabc.com" -url https://extranet.companyabc.com
    • stsadm.exe -o setproperty -pn peoplepicker-searchadforests -pv
      "domain:companyabc.com,COMPANYABCsvc_sppplpick,Password1;domain:extran
      etabc.com" -url https://spcaext.companyabc.com

• Syntax is critical
• Run against all web apps
DESIGN FOR CLIENTLESS ACCESS TO
 SHAREPOINT
• Services Applications for Extranet Clients:
   • Word Services
   • Excel Services
   • Visio Services
   • Access Services
   • InfoPath Forms Services

• Allows ‗Clientless‘ access to SharePoint content, for
  Extranet partners without Office
STANDARD REQUIREMENTS APPLY TO
 EXTRANETS AS WELL
• SharePoint-aware Antivirus
   • i.e. Forefront Protection for SharePoint

• SharePoint-aware Backup and Restore
   • i.e. System Center Data Protection Manager (DPM) 2010

• Rights Management?
   • Active Directory Rights Management Services (AD RMS)
CONTENT DEPLOYMENT WITH EXTRANETS
CLAIMS-BASED AUTHENTICATION
CLAIMS-BASED AUTH
• SharePoint doesn‘t actually Authenticate Users, it relies on IIS or
  other providers
• SharePoint 2010 Allows for Classic and Claims-based Auth
  Scenarios
• Classic Authentication is similar to SharePoint 2007
• Claims based Auth adds the following key benefits:
    •   Allows for Multiple Authentication Types per Web Application Zone
    •   Removes SharePoint from the Authentication Provider
    •   Allows for federation between organizations (AD FS, etc.) scenarios
    •   Does not require Kerberos Delegation

• Remember the difference between Authentication and
  Authorization…
CLASSIC VS. CLAIMS-BASED AUTH
                                                        Classic-mode     Claims-based
Type                                                    authentication   authentication
Windows
     NTLM
     Kerberos
                                                        Yes              Yes
     Anonymous
     Basic
     Digest


Forms-based authentication
     LDAP
                                                         No              Yes
     SQL database or other database
     Custom or third-party membership and role providers

SAML token-based authentication
    AD FS 2.0
                                                        No               Yes
    Third-party identity provider
    LDAP
MIXED-MODE VS. MULTI-AUTHENTICATION
EXAMPLE: PARTNER ENVIRONMENT WITH
MULTIPLE AUTH TYPES ON SINGLE W.A.
FOREFRONT UNIFIED ACCESS
      GATEWAY 2010
UAG ARCHITECTURE                        Data Center / Corporate Network

                                                                 Exchange
                                                                 CRM
                      Mobile                                     SharePoint
                                                                 IIS based
                                                                 IBM, SAP, Oracle
Home / Friend
  / Kiosk                        Layer3 VPN                      Terminal /
                                                                 Remote Desktop
                                 HTTPS (443)                     Services
                      Internet
                                 DirectAccess

                                                                 Non web



Business Partners /                                          AD, ADFS,
 Sub-Contractors                                             RADIUS, LDAP….

                                                               NPS, ILM

  Employees Managed Machines
WHAT ABOUT TMG? (NEW ISA)

Capability                                                                      TMG 2010   UAG
                                                                                           2010
Publish Web applications using HTTPS                                            X          X
Publish internal mobile applications to roaming mobile devices                  X          X
Layer 3 firewall                                                                X          X*
Outbound scenarios support                                                      X          X*
Array support                                                                   X
Globalization and administration console localization                           X
Wizards and predefined settings to publish SharePoint sites and Exchange        X          X
Wizards and predefined settings to publish various applications                            X
Active Directory Federation Services (ADFS) support                                        X
Rich authentication (for example, one-time password, forms-based, smart card)   X          X

Application protection (Web application firewall)                               Basic      Full
Endpoint health detection                                                                  X
Information leakage prevention                                                             X
Granular access policy                                                                     X
Unified Portal                                                                             X
WHAT IS FOREFRONT IDENTITY MANAGER?
IDENTITY AND ACCESS MANAGEMENT

  Secure Messaging       Secure Collaboration            Secure Endpoint


                         Information Protection


                     Identity and Access Management




                                                  Active Directory Federation Services
                                                                 ®
WHY FIM FOR SHAREPOINT?
MANAGE SHAREPOINT IDENTITIES
• Create Multiple Authentication Providers for SharePoint
  Farms
   • AD DS Forests (Extranet forests)
   • AD LDS Authentication Providers
   • SQL Table (FBA) Authentication Sources
   • LDAP Providers
   • Etc…

• Keep those Authentication Providers Managed
IDENTITY MANAGEMENT
USER PROVISIONING FOR SHAREPOINT AND OTHER APPLICATIONS

 •    Policy-based identity lifecycle management system
 •    Built-in workflow for identity management
 •    Automatically synchronize all user information to different directories across the enterprise
 •    Automates the process of on-boarding users

                                                                          Active
                                                                          Directory



                                                                          Extranet
                                                                          Forest
                                                            Workflow
                        User Enrollment
                                                                          Test
                                                                          Forest

                                                  FIM
     HR System
                                                                          FBA
                                                                          Table
                                           Approval


                                                                          LOB
 User provisioned on all allowed systems                                  App



                                                        Manager           VPN
IDENTITY MANAGEMENT
USER DE-PROVISIONING

   • Automated user de-provisioning
   • Built-in workflow for identity management
   • Real-time de-provisioning from all systems to prevent unauthorized access
     and information leakage

                                                                         Active
                                                                         Directory



                                                                         Extranet
                                                                         Forest
                                                              Workflow

                          User de-provisioned                            Test
                                                                         Forest

                                                        FIM
      HR System
                                                                         FBA
                                                                         Table



                                                                         LOB
       User de-provisioned or disabled on all systems                    App



                                                                         VPN
IDENTITY SYNCHRONIZATION AND CONSISTENCY
IDENTITY SYNCHRONIZATION ACROSS MULTIPLE DIRECTORIES


     Attribute
                    HR         givenName    Samantha
    Ownership
                    System     sn           Dearing               FIM
                               title
                               mail
    FirstName
                               employeeID   007
    LastName                   telephone
   EmployeeID                                                     GivenName
                                                                  givenName    Samantha
                                                                  sn           Dearing
                                                                  title        Coordinator
                    Internal   givenName    Samara
                                                                  mail         someone@example.com
                    AD         sn
                               title
                                            Darling
                                            Coordinator
                                                                  employeeID   007
                                                                  telephone    555-0129
                               mail
            Title
                               employeeID   007
                               telephone

                                                                    Identity
                    Extranet
                                                                      Data
                               givenName    Sam
                    AD         sn           Dearing
                               title        Intern
          E-Mail               mail
                               employeeID
                                            someone@example.com
                                            007                   Aggregation
                               telephone



                    LDAP       givenName    Sammy
                               sn           Dearling
                               title
                               mail
     Telephone
                               employeeID   008
                               telephone    555-0129
IDENTITY SYNCHRONIZATION AND CONSISTENCY
IDENTITY CONSISTENCY ACROSS MULTIPLE DIRECTORIES


     Attribute
                    HR         givenName    Samantha
    Ownership
                    System     sn           Dearing               FIM
                               title
                               mail
    FirstName
                               employeeID   007
    LastName                   telephone
   EmployeeID                                                     givenName    Samantha
                                                                               Bob
                                                                  sn           Dearing
                                                                  title        Coordinator
                    Internal   givenName    Samara
                                                                  mail         someone@example.com
                                                                               someone@example.com
                    AD         sn
                               title
                                            Darling
                                            Coordinator
                                                                  employeeID   007
                                                                  telephone    555-0129
                               mail
            Title
                               employeeID   007
                               telephone

                                                                       Identity
                    Extranet
                                                                         Data
                               givenName    Sam

                    AD         sn
                               title
                                            Dearing
                                            Intern
          E-Mail               mail
                               employeeID
                                            someone@example.com
                                            007                       Brokering
                               telephone
                                                                    (Convergence)
                    LDAP       givenName    Sammy
                               sn           Dearling
                               title
                               mail
     Telephone
                               employeeID   007
                               telephone    555-0129
CUSTOMIZABLE IDENTITY PORTAL
SharePoint-based Identity Portal
for Management and Self Service

                                   How you extend it
                                    Add your own portal pages
                                    or web parts
                                    Build new custom solutions
                                    Expose new attributes to manage by
                                    extending FIM schema
                                    Choose SharePoint theme to customize
                                    look and feel
CUSTOMIZABLE IDENTITY PORTAL
• Can be used to allow Extranet Partners to Perform Self-
  Service Management
   • Give control of Account Management to users/administrators of
     the extranet partner
   • Secure access to portal through VPN/Reverse Proxy
   • Portal in the DMZ
• Can be used for Self-Service Password Reset (via
  domain-joined computer)
STRONG AUTHENTICATION—CERTIFICATE AUTHORITY
              • Streamline deployment by enrolling user and computer certificates
                  without user intervention
              •   Simplify certificate and SmartCard management using Forefront
                  Identity Manager (FIM)
              •   Can be used to automate Certificate management for dual factor auth
                  approaches to SharePoint logins

                                             End User SmartCard

                                                                        User is validated using multi-
       FIM policy triggers request for                                  factor authentication
       FIM CM to issue certificate or
     Certificate is issued to user and
       SmartCard
     written to either machine or
     smart card


                                                           FIM CM

                                                                                                                       End User
                                                                                                         SmartCard
                        FIM
HR System
          FIM Certificate Management
          (CM) requests certificate                                                                      User ID and
 User Enrollment and AD CS
          creation from
 Authentication request sent by                                                                           Password
 HR System

                                         Active Directory Certificate
                                              Services (AD CS)
REAL WORLD FIM USAGE SCENARIOS
FIM FOR EXTRANET FOREST MGMT
• Internal AD DS Forest
• DMZ Extranet AD DS Forest
• FIM Auto-provisions certain user accounts in Extranet forest and
  keeps Passwords in Sync to allow Internal users to
  access/collaborate with Partners
• FIM allows Self-Service Portal Access for Extranet user accounts
  in the partner forest
• Two-factor Auth scenarios, to automate provisioning of user
  accounts AND certificates to systems
FIM FOR ROLE BASED ACCESS
 CONTROL
• FIM is central to RBAC Strategy
• Can auto-add users to Groups based on RBAC Criteria
• HR Defines a user‘s access based on their role
• FIM auto-adds that user to specific Role Groups in AD DS, which
  are tied to SharePoint Groups that have the rights that that role
  group requires.
            User1

                         Role                           SharePoint
                         Group                            Group

            User2
SESSION SUMMARY
• Understand the Extranet Design Options for 2010
• Keep Extranet Accounts out of local AD
• Determine how Identities will be Managed
• Use FIM for Identity Management, Self-Service, and
  Provisioning/Deprovisioning of Extranet Accounts
• Use UAG to secure inbound access to extranets/intranets
Thank you to our Sponsors


 Gold Sponsors




                           Silver Sponsors



Bronze Sponsors
Michael Noel
     Twitter: @MichaelTNoel
          www.cco.com
Slides: slideshare.net/michaeltnoel

More Related Content

What's hot

Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Michael Noel
 
Leveraging SharePoint for Extranets
Leveraging SharePoint for ExtranetsLeveraging SharePoint for Extranets
Leveraging SharePoint for ExtranetsAvtex
 
sharepoint.microsoft.com
sharepoint.microsoft.comsharepoint.microsoft.com
sharepoint.microsoft.comwebhostingguy
 
Single sign on (SSO) How does your company apply?
Single sign on (SSO) How does your company apply?Single sign on (SSO) How does your company apply?
Single sign on (SSO) How does your company apply?Đỗ Duy Trung
 
Identity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and ShibbolethIdentity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and ShibbolethAndrew Petro
 
Presentation sso design_security
Presentation sso design_securityPresentation sso design_security
Presentation sso design_securityMarco Morana
 
Alfresco: Implementing secure single sign on (SSO) with OpenSAML
Alfresco: Implementing secure single sign on (SSO) with OpenSAMLAlfresco: Implementing secure single sign on (SSO) with OpenSAML
Alfresco: Implementing secure single sign on (SSO) with OpenSAMLJ V
 
Oracle 4월 20일
Oracle 4월 20일Oracle 4월 20일
Oracle 4월 20일Cana Ko
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantoneJose R
 
Office 365: Planning and Automating for Hybrid Identity Scenarios in the Clou...
Office 365: Planning and Automating for Hybrid Identity Scenarios in the Clou...Office 365: Planning and Automating for Hybrid Identity Scenarios in the Clou...
Office 365: Planning and Automating for Hybrid Identity Scenarios in the Clou...Microsoft TechNet - Belgium and Luxembourg
 
Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Oliver Pfaff
 
Introducing SAML 2.0 Protocol: Security and Performance
Introducing SAML 2.0 Protocol: Security and PerformanceIntroducing SAML 2.0 Protocol: Security and Performance
Introducing SAML 2.0 Protocol: Security and PerformanceAmin Saqi
 
Dave Carroll Application Services Salesforce
Dave Carroll Application Services SalesforceDave Carroll Application Services Salesforce
Dave Carroll Application Services Salesforcedeimos
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Anil Saldanha
 
Introduction to SAML 2.0
Introduction to SAML 2.0Introduction to SAML 2.0
Introduction to SAML 2.0Mika Koivisto
 
Authentication and Single Sing on
Authentication and Single Sing onAuthentication and Single Sing on
Authentication and Single Sing onguest648519
 

What's hot (20)

Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
 
Leveraging SharePoint for Extranets
Leveraging SharePoint for ExtranetsLeveraging SharePoint for Extranets
Leveraging SharePoint for Extranets
 
sharepoint.microsoft.com
sharepoint.microsoft.comsharepoint.microsoft.com
sharepoint.microsoft.com
 
Single sign on (SSO) How does your company apply?
Single sign on (SSO) How does your company apply?Single sign on (SSO) How does your company apply?
Single sign on (SSO) How does your company apply?
 
Identity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and ShibbolethIdentity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and Shibboleth
 
Presentation sso design_security
Presentation sso design_securityPresentation sso design_security
Presentation sso design_security
 
Troubleshooting Federation, ADFS, and More
Troubleshooting Federation, ADFS, and More Troubleshooting Federation, ADFS, and More
Troubleshooting Federation, ADFS, and More
 
Alfresco: Implementing secure single sign on (SSO) with OpenSAML
Alfresco: Implementing secure single sign on (SSO) with OpenSAMLAlfresco: Implementing secure single sign on (SSO) with OpenSAML
Alfresco: Implementing secure single sign on (SSO) with OpenSAML
 
Oracle 4월 20일
Oracle 4월 20일Oracle 4월 20일
Oracle 4월 20일
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantone
 
Office 365: Planning and Automating for Hybrid Identity Scenarios in the Clou...
Office 365: Planning and Automating for Hybrid Identity Scenarios in the Clou...Office 365: Planning and Automating for Hybrid Identity Scenarios in the Clou...
Office 365: Planning and Automating for Hybrid Identity Scenarios in the Clou...
 
Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'
 
Saml in cloud
Saml in cloudSaml in cloud
Saml in cloud
 
Introducing SAML 2.0 Protocol: Security and Performance
Introducing SAML 2.0 Protocol: Security and PerformanceIntroducing SAML 2.0 Protocol: Security and Performance
Introducing SAML 2.0 Protocol: Security and Performance
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
Dave Carroll Application Services Salesforce
Dave Carroll Application Services SalesforceDave Carroll Application Services Salesforce
Dave Carroll Application Services Salesforce
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?
 
Introduction to SAML 2.0
Introduction to SAML 2.0Introduction to SAML 2.0
Introduction to SAML 2.0
 
Authentication and Single Sing on
Authentication and Single Sing onAuthentication and Single Sing on
Authentication and Single Sing on
 
Ad fs
Ad fsAd fs
Ad fs
 

Viewers also liked

Concordia Universtiy Seo Services Seminar
Concordia Universtiy Seo Services SeminarConcordia Universtiy Seo Services Seminar
Concordia Universtiy Seo Services SeminarGreg Bennett
 
Seo & Internet Marketing
Seo & Internet MarketingSeo & Internet Marketing
Seo & Internet Marketingalafrancis
 
Submission Writing Townsville Saturday 2 March 2013
Submission Writing Townsville Saturday 2 March 2013Submission Writing Townsville Saturday 2 March 2013
Submission Writing Townsville Saturday 2 March 2013CPA Australia
 
Townsville Regional Investment Profile
Townsville Regional Investment ProfileTownsville Regional Investment Profile
Townsville Regional Investment ProfileCPA Australia
 
TropLinks Graham Poon
TropLinks Graham PoonTropLinks Graham Poon
TropLinks Graham PoonCPA Australia
 
Grants Writing in Australia
Grants Writing in AustraliaGrants Writing in Australia
Grants Writing in AustraliaCPA Australia
 
Great Green Way Australia
Great Green Way AustraliaGreat Green Way Australia
Great Green Way AustraliaCPA Australia
 

Viewers also liked (8)

Concordia Universtiy Seo Services Seminar
Concordia Universtiy Seo Services SeminarConcordia Universtiy Seo Services Seminar
Concordia Universtiy Seo Services Seminar
 
Seo & Internet Marketing
Seo & Internet MarketingSeo & Internet Marketing
Seo & Internet Marketing
 
Submission Writing Townsville Saturday 2 March 2013
Submission Writing Townsville Saturday 2 March 2013Submission Writing Townsville Saturday 2 March 2013
Submission Writing Townsville Saturday 2 March 2013
 
Townsville Regional Investment Profile
Townsville Regional Investment ProfileTownsville Regional Investment Profile
Townsville Regional Investment Profile
 
TropLinks Graham Poon
TropLinks Graham PoonTropLinks Graham Poon
TropLinks Graham Poon
 
Grants Writing in Australia
Grants Writing in AustraliaGrants Writing in Australia
Grants Writing in Australia
 
EPIC Plan Marketing
EPIC Plan MarketingEPIC Plan Marketing
EPIC Plan Marketing
 
Great Green Way Australia
Great Green Way AustraliaGreat Green Way Australia
Great Green Way Australia
 

Similar to SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

Planning and Configuring Extranets in SharePoint 2010
Planning and Configuring Extranets in SharePoint 2010Planning and Configuring Extranets in SharePoint 2010
Planning and Configuring Extranets in SharePoint 2010Geoff Varosky
 
“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with EverythingDave Hay
 
Citrix Day 2014: ShareFile Enterprise
Citrix Day 2014: ShareFile EnterpriseCitrix Day 2014: ShareFile Enterprise
Citrix Day 2014: ShareFile EnterpriseDigicomp Academy AG
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
A great api is hard to find
A great api is hard to findA great api is hard to find
A great api is hard to findDan Diephouse
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the CloudWSO2
 
Deploy, Scale and Manage your Microsoft Investments with AWS
Deploy, Scale and Manage your Microsoft Investments with AWSDeploy, Scale and Manage your Microsoft Investments with AWS
Deploy, Scale and Manage your Microsoft Investments with AWSAmazon Web Services
 
Bouwen in de Cloud: Anthony Priestman - Filr
Bouwen in de Cloud: Anthony Priestman - FilrBouwen in de Cloud: Anthony Priestman - Filr
Bouwen in de Cloud: Anthony Priestman - FilrInterExperts
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015Sreeni Pamidala
 
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld
 
Building and packaging highly scalable services for maximum market penetratio...
Building and packaging highly scalable services for maximum market penetratio...Building and packaging highly scalable services for maximum market penetratio...
Building and packaging highly scalable services for maximum market penetratio...Ontico
 
SwiftKnowledge Multitenancy
SwiftKnowledge MultitenancySwiftKnowledge Multitenancy
SwiftKnowledge MultitenancyPivotLogix
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADuberbaum
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your AzureHolly Plude
 
Connect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureConnect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureK.Mohamed Faizal
 

Similar to SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010 (20)

Planning and Configuring Extranets in SharePoint 2010
Planning and Configuring Extranets in SharePoint 2010Planning and Configuring Extranets in SharePoint 2010
Planning and Configuring Extranets in SharePoint 2010
 
“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything
 
Citrix Day 2014: ShareFile Enterprise
Citrix Day 2014: ShareFile EnterpriseCitrix Day 2014: ShareFile Enterprise
Citrix Day 2014: ShareFile Enterprise
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
A great api is hard to find
A great api is hard to findA great api is hard to find
A great api is hard to find
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the Cloud
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the Cloud
 
Office 365 Identity Management options
Office 365 Identity Management options Office 365 Identity Management options
Office 365 Identity Management options
 
Deploy, Scale and Manage your Microsoft Investments with AWS
Deploy, Scale and Manage your Microsoft Investments with AWSDeploy, Scale and Manage your Microsoft Investments with AWS
Deploy, Scale and Manage your Microsoft Investments with AWS
 
Bouwen in de Cloud: Anthony Priestman - Filr
Bouwen in de Cloud: Anthony Priestman - FilrBouwen in de Cloud: Anthony Priestman - Filr
Bouwen in de Cloud: Anthony Priestman - Filr
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015
 
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
 
Building and packaging highly scalable services for maximum market penetratio...
Building and packaging highly scalable services for maximum market penetratio...Building and packaging highly scalable services for maximum market penetratio...
Building and packaging highly scalable services for maximum market penetratio...
 
Vormetric - Gherkin Event
Vormetric - Gherkin EventVormetric - Gherkin Event
Vormetric - Gherkin Event
 
SwiftKnowledge Multitenancy
SwiftKnowledge MultitenancySwiftKnowledge Multitenancy
SwiftKnowledge Multitenancy
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
Connect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureConnect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft Azure
 

More from Michael Noel

AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...Michael Noel
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024Michael Noel
 
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023Michael Noel
 
IT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital BrazzavilleIT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital BrazzavilleMichael Noel
 
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...Michael Noel
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018Michael Noel
 
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep DiveSPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep DiveMichael Noel
 
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 MelbourneAzure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 MelbourneMichael Noel
 
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018Michael Noel
 
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018Michael Noel
 
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...Michael Noel
 
Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017Michael Noel
 
Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée Michael Noel
 
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...Michael Noel
 
Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015Michael Noel
 
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015Michael Noel
 
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...Michael Noel
 
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014Michael Noel
 

More from Michael Noel (20)

AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
 
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
 
IT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital BrazzavilleIT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital Brazzaville
 
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018
 
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep DiveSPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
 
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 MelbourneAzure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
 
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
 
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
 
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
 
Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017
 
Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée
 
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
 
Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015
 
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
 
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
 
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

  • 2. Michael Noel PLANNING EXTRANETS WITH SHAREPOINT 2010
  • 3. MICHAEL NOEL • Author of SAMS Publishing titles ―SharePoint 2007 Unleashed,‖ the upcoming ―SharePoint 2010 Unleashed,‖ ―SharePoint 2003 Unleashed‖, ―Teach Yourself SharePoint 2003 in 10 Minutes,‖ ―Windows Server 2008 R2 Unleashed,‖ ―Exchange Server 2010 Unleashed‖, ―ISA Server 2006 Unleashed‖, and many other titles . • Partner at Convergent Computing (www.cco.com / +1(510)444-5700) – San Francisco, U.S.A. based Infrastructure/Security specialists for SharePoint, AD, Exchange, Security
  • 4. WHAT WE‘LL COVER • Why an Extranet? • SharePoint 2010 Extranets • Extranet Architecture Options • Claims-based Authentication • Forefront Unified Access Gateway (UAG) for extranets • Forefront Identity Manager for Identity Management in an Extranet
  • 6. WHY AN EXTRANET? • Security Isolation • Isolation of Data • Less Exposure, Perimeter Network Scenarios • Partner Collaboration • Share SP Content with External Partners • Control Partner Accounts Anonymous Customer Scenarios are not really Extranets
  • 7. SHAREPOINT 2010 EXTRANETS • Claims-based Authentication Support • Multiple Authentication Providers • Better Scalability (Services Architecture) • Goodbye SSP! • Server Groups • Services Applications • Multiple Authentication Types per Web Application
  • 9. DESIGN AROUND SECURITY REQUIREMENTS • Scenario 1: Extranet and Internal Users in Single Farm • 1A: Single Web App / Single Site Collection Less Secure • 1B: Single Web App / Separate Site Collections • 1C: Multiple Web Apps / Content DBs • 1D: Separate App Pool / Service App Group • Scenario 2: Extranet and Internal Users in Single Farm / Separate Trusted Forests • Scenario 3: Extranet and Internal Users in Multiple Farms / One-Way Trust • Scenario 4: Extranet an Internal Users in Separate Farms / Claims- based Auth for Internal Access to Extranet More • Scenario 5: Extranet an Internal Users in Separate Farms / No Secure Access for Internal Accounts to Extranet • Scenario 6: Separate Farms / AD FS Federation for Extranet Auth
  • 10. EXTRANET SCENARIO 1: EXTRANET AND INTERNAL USERS IN SINGLE FARM 1A: Single Web App / Single Site Collection 1B: Single Web App / Separate Site Collections 1C: Multiple Web Apps / Content DBs 1D: Separate App Pool / Service App Group
  • 11. EXTRANET SCENARIO 2: EXTRANET AND INTERNAL USERS IN SINGLE FARM / SEPARATE TRUSTED FORESTS
  • 12. EXTRANET SCENARIO 3: EXTRANET AND INTERNAL USERS IN MULTIPLE FARMS AND PERIMETER NETWORK / ONE-WAY TRUST
  • 13. EXTRANET SCENARIO 4: EXTRANET AN INTERNAL USERS IN SEPARATE FARMS / CLAIMS-BASED AUTH PROVIDER FOR INTERNAL AUTH TO EXTRANET
  • 14. EXTRANET SCENARIO 5: EXTRANET AN INTERNAL USERS IN SEPARATE FARMS / NO ACCESS FOR INTERNAL ACCOUNTS TO EXTRANET
  • 15. EXTRANET SCENARIO 6: SEPARATE FARMS / AD FS FEDERATION FOR EXTRANET AUTH
  • 17. ONE-WAY TRUST SCENARIOS • People Picker needs to be configured to crawl domain if it doesn‘t trust the domain where the SharePoint farm is installed. • Only with STSADM (Rare exception when you can‘t use PowerShell) • Example Syntax: • stsadm.exe -o setapppassword -password AnyPassw0rd • stsadm.exe -o setproperty -pn peoplepicker-searchadforests -pv "domain:companyabc.com,COMPANYABCsvc_sppplpick,Password1;domain:extran etabc.com" -url https://extranet.companyabc.com • stsadm.exe -o setproperty -pn peoplepicker-searchadforests -pv "domain:companyabc.com,COMPANYABCsvc_sppplpick,Password1;domain:extran etabc.com" -url https://spcaext.companyabc.com • Syntax is critical • Run against all web apps
  • 18. DESIGN FOR CLIENTLESS ACCESS TO SHAREPOINT • Services Applications for Extranet Clients: • Word Services • Excel Services • Visio Services • Access Services • InfoPath Forms Services • Allows ‗Clientless‘ access to SharePoint content, for Extranet partners without Office
  • 19. STANDARD REQUIREMENTS APPLY TO EXTRANETS AS WELL • SharePoint-aware Antivirus • i.e. Forefront Protection for SharePoint • SharePoint-aware Backup and Restore • i.e. System Center Data Protection Manager (DPM) 2010 • Rights Management? • Active Directory Rights Management Services (AD RMS)
  • 22. CLAIMS-BASED AUTH • SharePoint doesn‘t actually Authenticate Users, it relies on IIS or other providers • SharePoint 2010 Allows for Classic and Claims-based Auth Scenarios • Classic Authentication is similar to SharePoint 2007 • Claims based Auth adds the following key benefits: • Allows for Multiple Authentication Types per Web Application Zone • Removes SharePoint from the Authentication Provider • Allows for federation between organizations (AD FS, etc.) scenarios • Does not require Kerberos Delegation • Remember the difference between Authentication and Authorization…
  • 23. CLASSIC VS. CLAIMS-BASED AUTH Classic-mode Claims-based Type authentication authentication Windows NTLM Kerberos Yes Yes Anonymous Basic Digest Forms-based authentication LDAP No Yes SQL database or other database Custom or third-party membership and role providers SAML token-based authentication AD FS 2.0 No Yes Third-party identity provider LDAP
  • 25. EXAMPLE: PARTNER ENVIRONMENT WITH MULTIPLE AUTH TYPES ON SINGLE W.A.
  • 26. FOREFRONT UNIFIED ACCESS GATEWAY 2010
  • 27. UAG ARCHITECTURE Data Center / Corporate Network Exchange CRM Mobile SharePoint IIS based IBM, SAP, Oracle Home / Friend / Kiosk Layer3 VPN Terminal / Remote Desktop HTTPS (443) Services Internet DirectAccess Non web Business Partners / AD, ADFS, Sub-Contractors RADIUS, LDAP…. NPS, ILM Employees Managed Machines
  • 28.
  • 29. WHAT ABOUT TMG? (NEW ISA) Capability TMG 2010 UAG 2010 Publish Web applications using HTTPS X X Publish internal mobile applications to roaming mobile devices X X Layer 3 firewall X X* Outbound scenarios support X X* Array support X Globalization and administration console localization X Wizards and predefined settings to publish SharePoint sites and Exchange X X Wizards and predefined settings to publish various applications X Active Directory Federation Services (ADFS) support X Rich authentication (for example, one-time password, forms-based, smart card) X X Application protection (Web application firewall) Basic Full Endpoint health detection X Information leakage prevention X Granular access policy X Unified Portal X
  • 30. WHAT IS FOREFRONT IDENTITY MANAGER?
  • 31. IDENTITY AND ACCESS MANAGEMENT Secure Messaging Secure Collaboration Secure Endpoint Information Protection Identity and Access Management Active Directory Federation Services ®
  • 32. WHY FIM FOR SHAREPOINT?
  • 33. MANAGE SHAREPOINT IDENTITIES • Create Multiple Authentication Providers for SharePoint Farms • AD DS Forests (Extranet forests) • AD LDS Authentication Providers • SQL Table (FBA) Authentication Sources • LDAP Providers • Etc… • Keep those Authentication Providers Managed
  • 34. IDENTITY MANAGEMENT USER PROVISIONING FOR SHAREPOINT AND OTHER APPLICATIONS • Policy-based identity lifecycle management system • Built-in workflow for identity management • Automatically synchronize all user information to different directories across the enterprise • Automates the process of on-boarding users Active Directory Extranet Forest Workflow User Enrollment Test Forest FIM HR System FBA Table Approval LOB User provisioned on all allowed systems App Manager VPN
  • 35. IDENTITY MANAGEMENT USER DE-PROVISIONING • Automated user de-provisioning • Built-in workflow for identity management • Real-time de-provisioning from all systems to prevent unauthorized access and information leakage Active Directory Extranet Forest Workflow User de-provisioned Test Forest FIM HR System FBA Table LOB User de-provisioned or disabled on all systems App VPN
  • 36. IDENTITY SYNCHRONIZATION AND CONSISTENCY IDENTITY SYNCHRONIZATION ACROSS MULTIPLE DIRECTORIES Attribute HR givenName Samantha Ownership System sn Dearing FIM title mail FirstName employeeID 007 LastName telephone EmployeeID GivenName givenName Samantha sn Dearing title Coordinator Internal givenName Samara mail someone@example.com AD sn title Darling Coordinator employeeID 007 telephone 555-0129 mail Title employeeID 007 telephone Identity Extranet Data givenName Sam AD sn Dearing title Intern E-Mail mail employeeID someone@example.com 007 Aggregation telephone LDAP givenName Sammy sn Dearling title mail Telephone employeeID 008 telephone 555-0129
  • 37. IDENTITY SYNCHRONIZATION AND CONSISTENCY IDENTITY CONSISTENCY ACROSS MULTIPLE DIRECTORIES Attribute HR givenName Samantha Ownership System sn Dearing FIM title mail FirstName employeeID 007 LastName telephone EmployeeID givenName Samantha Bob sn Dearing title Coordinator Internal givenName Samara mail someone@example.com someone@example.com AD sn title Darling Coordinator employeeID 007 telephone 555-0129 mail Title employeeID 007 telephone Identity Extranet Data givenName Sam AD sn title Dearing Intern E-Mail mail employeeID someone@example.com 007 Brokering telephone (Convergence) LDAP givenName Sammy sn Dearling title mail Telephone employeeID 007 telephone 555-0129
  • 38. CUSTOMIZABLE IDENTITY PORTAL SharePoint-based Identity Portal for Management and Self Service How you extend it Add your own portal pages or web parts Build new custom solutions Expose new attributes to manage by extending FIM schema Choose SharePoint theme to customize look and feel
  • 39. CUSTOMIZABLE IDENTITY PORTAL • Can be used to allow Extranet Partners to Perform Self- Service Management • Give control of Account Management to users/administrators of the extranet partner • Secure access to portal through VPN/Reverse Proxy • Portal in the DMZ • Can be used for Self-Service Password Reset (via domain-joined computer)
  • 40. STRONG AUTHENTICATION—CERTIFICATE AUTHORITY • Streamline deployment by enrolling user and computer certificates without user intervention • Simplify certificate and SmartCard management using Forefront Identity Manager (FIM) • Can be used to automate Certificate management for dual factor auth approaches to SharePoint logins End User SmartCard User is validated using multi- FIM policy triggers request for factor authentication FIM CM to issue certificate or Certificate is issued to user and SmartCard written to either machine or smart card FIM CM End User SmartCard FIM HR System FIM Certificate Management (CM) requests certificate User ID and User Enrollment and AD CS creation from Authentication request sent by Password HR System Active Directory Certificate Services (AD CS)
  • 41. REAL WORLD FIM USAGE SCENARIOS
  • 42. FIM FOR EXTRANET FOREST MGMT • Internal AD DS Forest • DMZ Extranet AD DS Forest • FIM Auto-provisions certain user accounts in Extranet forest and keeps Passwords in Sync to allow Internal users to access/collaborate with Partners • FIM allows Self-Service Portal Access for Extranet user accounts in the partner forest • Two-factor Auth scenarios, to automate provisioning of user accounts AND certificates to systems
  • 43. FIM FOR ROLE BASED ACCESS CONTROL • FIM is central to RBAC Strategy • Can auto-add users to Groups based on RBAC Criteria • HR Defines a user‘s access based on their role • FIM auto-adds that user to specific Role Groups in AD DS, which are tied to SharePoint Groups that have the rights that that role group requires. User1 Role SharePoint Group Group User2
  • 44. SESSION SUMMARY • Understand the Extranet Design Options for 2010 • Keep Extranet Accounts out of local AD • Determine how Identities will be Managed • Use FIM for Identity Management, Self-Service, and Provisioning/Deprovisioning of Extranet Accounts • Use UAG to secure inbound access to extranets/intranets
  • 45. Thank you to our Sponsors Gold Sponsors Silver Sponsors Bronze Sponsors
  • 46. Michael Noel Twitter: @MichaelTNoel www.cco.com Slides: slideshare.net/michaeltnoel

Editor's Notes

  1. Opening slide please include
  2. With automated user provisioning through Forefront Identity Manager, IT can automatically give and update rights to resources and business applications as per the user’s profile. It becomes easy to provision user identity to only those resources and applications which user is suppose to work and prevent from unauthorized use.organizations using Forefront Identity Manager can define policies that automatically create user accounts, mail boxes, and group memberships in real time so that new employees are productive immediately. When a user changes roles within an organization, Forefront Identity Manager automatically makes the necessary changes in heterogeneous target systems to add and remove access rights.For example, if a user moves from a role in sales to a role in marketing, Forefront Identity Manager can remove them from sales-specific groups and add them to marketing-specific groups to deliver appropriate access permissions to perform their job function.
  3. With Forefront Identity Manager (FIM), organizations can define automatic policy enforcement for removing user accounts, mail boxes, and group memberships in real time, which minimizes the risk of information leakage from unauthorized access to resources and confidential information. With FIM, de-provisioning for users leaving the enterprise also becomes centralized and less complicated, which makes it easier to ensure complete de-provisioning to handle future compliance audits.For example, if a user leaves the organization, the HR system forwards a de-provisioning request to FIM. FIM follows approval workflow. With the manager’s approval, FIM automatically removes all rights, account information, mail boxes, and memberships from all relevant applications, groups, and different directories.
  4. organizations can also use FIM to synchronize e-mail address lists that are maintained by heterogeneous e-mail systems, such as Microsoft Exchange Server 2000, Exchange Server 2007, and Lotus Notes. organizations that have multiple Active Directory Domain Services and Exchange forests can use FIM to build a single address book. This increases the value of identity integration by simplifying collaboration as well as increasing IT control.Note:FIM 2010 provides a simplified single sign on experience through its identity synchronization capabilities, delivering the ability to synchronize passwords across heterogeneous systems.The policy-based management system of FIM manages users’ identity lifecycle and protects corporate assets against misuse as users move between roles or leave the organization. http://www.microsoft.com/forefront/identitymanager/en/us/features.aspxhttp://download.microsoft.com/download/3/2/A/32A7B77A-7D3A-4D24-ACE7-5AA3A908B95E/Understanding%20FIM%202010.docx
  5. Combining identity data across multiple directories and systems yields automated account reconciliation and consistency management for user accounts, credentials, and attributes. This means organizations with many different directories and other data repositories, such as an HR application, can use Forefront Identity Manager to synchronize user accounts across systems.
  6. Active Directory Certificate Services (AD CS) provides an integrated public key infrastructure that enables the secure exchange of information. With strong security and easy administration across the Internet, extranets, intranets, and applications, AD CS provides customizable services for issuing and managing the certificates used in software security systems employing public key technologies.BenefitsIncrease access security with better security than username and password solutions, and verify the validity of certificates using the Online Certificate Status Protocol (OCSP).Reduce cost of ownership by taking advantage of Active Directory integration for enrollment, storage, and revocation processes.Simplify certificate management using a single information store that comes from full integration with Microsoft Management Console.Streamline deployment by enrolling user and computer certificates without user intervention.Client retrieves certificate policy from Active Directory.Client submits certificate request to Certificate Server based on policy.Certificate Server retrieves user information from Active Directory.Certificate Server returns signed digital certificate to the client.