SlideShare a Scribd company logo
Why can’t I access the portal?SharePoint Authentication 101 Dan Usher 25 July 2009
Agenda Introductions A brief primer on A&A history Approaches to Authentication with SharePoint Extending into the Extranet What works best and where? Pain Points Worst Practices to Avoid Conclusions
Who am I? Dan Usher Booz Allen Hamilton, Associate SharePoint Architect & Implementation Engineer MCP, Security+, MCTS
Introductions What environments have I worked in? What have I seen? What is this talk about? Who are you all? 
A very brief primer on A&A Identification (n) - process of establishing who someone or something claims to be Authentication (n) - certification, validating the authenticity of something or someone Authorization (n) - a document giving an official instruction or command What’s the confusion?
Basics of SharePoint Authentication Out of the box IIS basics Authentication is handled by IIS and ASP.NET Checks user against Active Directory, Local Machine accounts, or other auth provider Passes verification to IIS to proceed Source: http://go.spdan.com/iisauth ASP.NET Authentication
Approaches to Auth with SharePoint Integrated Windows Authentication Forms Based Authentication Custom Membership Provider ADFS and Geneva Third Party SSO/RSO Smart Card
Integrated Windows Authentication NTLM Challenge Response Default SharePoint authentication schema Kerberos (Negotiate) Symmetric key cryptography Requires a little more configuration Server Delegation Account Delegation Security Principle Names
SharePint Anyone?
Two SharePoint Consultants enter a bar… NTLM - hand your ID every time you want a drink Kerberos - hand your ID the first time at the door and it’s passed transparently in the background for you Anonymous Access - equivalent of an open bar at a wedding, no one really asks…
So what’s this mean to my end user? Performance Caching Large Environments Security Client-Server || Server-Client Delegation RSS Feeds Excel Calculation Services Double Hops Smartcards
Forms Based Authentication MOSS LDAP V3 Membership Provider SQL Membership Provider ASP.net v2 Membership Providers Smartcard and SQL Hybrid
How’s FBA Effect me? Client Integration Content Crawling SP2 + Hotfixes http://go.spdan.com/fba-issues
Active Directory Federated Services Provides for Web-SSO Allows for federation between Forests / Domains Requires a policy file between Web-SSO servers Disables Client Integration by default
Thoughts on ADFS and Client Integration SharePoint becomes an island Bring in users from other organizations FBA Updates Requires hotfixes on the server Requires an additional HTTP handler Requires hotfixes on XP, or SP2 on Vista
Geneva and Claims Based Authentication Geneva Framework -> Windows Identity Foundation Geneva Server -> Active Directory Federation Services Windows Cardspace Geneva -> Windows Cardspace Utilizes WS-* and SAML 2.0 protocols Provides for security token service (STS)
Geneva and End Users Beta is available from Connect Will solve client integration issues Will allow for greater federation
Third Party SSO/RSO CA SiteMinder Tivoli Ping Federate Version 3 Enhanced Authentication
SmartCard Authentication Simplicity… Source: http://go.spdan.com/pki
Smart Card Authentication and IIS
So why SmartCards? Simplicity… to the end user Provides a secure tamper resistant storage physical token Enables portability of credentials and private information similar to other Federated Identity… …like OpenID, Facebook Connect, Google OpenSocial, Microsoft Hailstorm A PIN is used …Security
User Experience Pitfalls of SmartCard Auth OCSP or CRL checking could cause authentication to fail if CRL is not available Depending on number of requests, CRL checking could cause server load Puts server in DMZ, increases attack surface area – wfetch will show your SharePoint Version User’s account must be linked to their SmartCard user principal name User selecting certificate that does not contain UPN
Extending into the Extranet ISA Server 2006 Intelligent Application Gateway Separate Domains and Trusts User Experience Complexity Increases
Microsoft External Collaboration Toolkit for SharePoint http://go.spdan.com/setc Planning Guide Deployment and Operations Guide Information Materials Solutions Accelerator AD & ADAM
Microsoft ISA Server 2006 Soon to be Forefront Threat Management Gateway Integrated network edge security gateway to defend against: Web based threats Securely Publish Content for Remote Access Securely Connect Branch Offices Provides: Constrained Kerberos Delegation URL Masking of web servers Smart Card Authentication SSL Termination
Microsoft Intelligent Application Gateway Soon to be Forefront Unified Application Gateway Remote Access Gateway that provides secure access to applications Provides: SSL VPN access capabilities Similar to a regular VPN without a client Web Application firewall Endpoint Security Compliance Checking Persistent User Caching Smartcard Authentication ISA 2006 Capabilities
Third Party Extranet Applications Epok Edition for Microsoft SharePoint SharePoint Solutions - Extranet Collaboration Manager Version 3 Enhanced Authentication
What works best and where? NTLM Authentication via IP Address Authentication to server within a different Forest or domain No Active Directory exists Limited Firewall Ports Kerberos Authentication within a network boundary Timing of servers is closely coupled Authentication to servers within a single Forest or domain
But I still can’t get in, what gives?
SharePoint Policy Issues Web Application Policy set to deny all Web Application All Authenticated Users Removed SharePoint Groups removed
Account Issues SmartCard Enabled Accounts Account aging Smart Card UPN does not match User Account UPN Smart Card Choosing the wrong certificate Local User Groups and Accounts Used
Infrastructure Group Policy and effects on service accounts Active Directory Offline Server time > 5 minutes difference Domains and Database Migrations SharePoint Groups Inheritance Domains, Trusts, Root Suffixes…
Development and Branding Branding Issues User Permissions (IIS_WPG) Reference files in other sites Master page tokens Development Issues Impersonation / Elevated Privileges Web Services
Avoiding Catastrophe Documentation, documentation, documentation… Staging and Testing Procedures for new features, solutions, etc. Configuration Management Policies and Procedures Tools installed (SPAdminToolkit, etc.) Planned Service Accounts
Conclusions It’s not always that SharePoint is down Sometimes SharePoint is misconfigured More often than not, it’s user awareness and site configuration
Questions?
Follow me on Twitter – twitter.com/usher Follow my blog – http://www.sharepointdan.com IM? gTalk danusher79 Live danusher@live.com E-mail: dan@spdan.com And that’s a wrap…

More Related Content

What's hot

presentation_finals
presentation_finalspresentation_finals
presentation_finals
Shivashish Kumar
 
Decriminalize Your Colleagues - How to Address Shadow IT in the Enterprise
Decriminalize Your Colleagues -  How to Address Shadow IT in the EnterpriseDecriminalize Your Colleagues -  How to Address Shadow IT in the Enterprise
Decriminalize Your Colleagues - How to Address Shadow IT in the Enterprise
BoxHQ
 
Which Came First: The Phish or the Opportunity to Defend Against It
Which Came First: The Phish or the Opportunity to Defend Against ItWhich Came First: The Phish or the Opportunity to Defend Against It
Which Came First: The Phish or the Opportunity to Defend Against It
JamieWilliams130
 
Synapse india reviews on security for the share point developer
Synapse india reviews on security for the share point developerSynapse india reviews on security for the share point developer
Synapse india reviews on security for the share point developer
saritasingh19866
 
Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'
Oliver Pfaff
 
End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity Management
WSO2
 
Secure Code Warrior - Trust no input
Secure Code Warrior - Trust no inputSecure Code Warrior - Trust no input
Secure Code Warrior - Trust no input
Secure Code Warrior
 
Preparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional AccessPreparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional Access
Jason Condo
 
Visio Diagram of a user SSO Flow
Visio Diagram of a user SSO FlowVisio Diagram of a user SSO Flow
Visio Diagram of a user SSO Flow
Mike Reams
 
TeraGrid's GRAM Auditing & Accounting, & its Integration with the LEAD Scienc...
TeraGrid's GRAM Auditing & Accounting, & its Integration with the LEAD Scienc...TeraGrid's GRAM Auditing & Accounting, & its Integration with the LEAD Scienc...
TeraGrid's GRAM Auditing & Accounting, & its Integration with the LEAD Scienc...
marcuschristie
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
Information Security Services SA
 
Single sign on using SAML
Single sign on using SAML Single sign on using SAML
Single sign on using SAML
Programming Talents
 
Design and Configuration of App Supportive Indirect Internet Access using a ...
Design and Configuration of App Supportive Indirect Internet  Access using a ...Design and Configuration of App Supportive Indirect Internet  Access using a ...
Design and Configuration of App Supportive Indirect Internet Access using a ...
IJMER
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?
Anil Saldanha
 
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
OpenIDFoundation
 
Identity Management in SharePoint 2013
Identity Management in SharePoint 2013Identity Management in SharePoint 2013
Identity Management in SharePoint 2013
SPC Adriatics
 
Secure Salesforce: Org Access Controls
Secure Salesforce: Org Access ControlsSecure Salesforce: Org Access Controls
Secure Salesforce: Org Access Controls
Salesforce Developers
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
rahul kundu
 
AzureAAD
AzureAADAzureAAD
AzureAAD
TonyHotko
 

What's hot (19)

presentation_finals
presentation_finalspresentation_finals
presentation_finals
 
Decriminalize Your Colleagues - How to Address Shadow IT in the Enterprise
Decriminalize Your Colleagues -  How to Address Shadow IT in the EnterpriseDecriminalize Your Colleagues -  How to Address Shadow IT in the Enterprise
Decriminalize Your Colleagues - How to Address Shadow IT in the Enterprise
 
Which Came First: The Phish or the Opportunity to Defend Against It
Which Came First: The Phish or the Opportunity to Defend Against ItWhich Came First: The Phish or the Opportunity to Defend Against It
Which Came First: The Phish or the Opportunity to Defend Against It
 
Synapse india reviews on security for the share point developer
Synapse india reviews on security for the share point developerSynapse india reviews on security for the share point developer
Synapse india reviews on security for the share point developer
 
Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'
 
End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity Management
 
Secure Code Warrior - Trust no input
Secure Code Warrior - Trust no inputSecure Code Warrior - Trust no input
Secure Code Warrior - Trust no input
 
Preparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional AccessPreparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional Access
 
Visio Diagram of a user SSO Flow
Visio Diagram of a user SSO FlowVisio Diagram of a user SSO Flow
Visio Diagram of a user SSO Flow
 
TeraGrid's GRAM Auditing & Accounting, & its Integration with the LEAD Scienc...
TeraGrid's GRAM Auditing & Accounting, & its Integration with the LEAD Scienc...TeraGrid's GRAM Auditing & Accounting, & its Integration with the LEAD Scienc...
TeraGrid's GRAM Auditing & Accounting, & its Integration with the LEAD Scienc...
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 
Single sign on using SAML
Single sign on using SAML Single sign on using SAML
Single sign on using SAML
 
Design and Configuration of App Supportive Indirect Internet Access using a ...
Design and Configuration of App Supportive Indirect Internet  Access using a ...Design and Configuration of App Supportive Indirect Internet  Access using a ...
Design and Configuration of App Supportive Indirect Internet Access using a ...
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?
 
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
 
Identity Management in SharePoint 2013
Identity Management in SharePoint 2013Identity Management in SharePoint 2013
Identity Management in SharePoint 2013
 
Secure Salesforce: Org Access Controls
Secure Salesforce: Org Access ControlsSecure Salesforce: Org Access Controls
Secure Salesforce: Org Access Controls
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 

Similar to Why Cant I Access The Portal

Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
Nordic Infrastructure Conference
 
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
Michael Noel
 
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
NCCOMMS
 
DD109 Claims Based AuthN in SharePoint 2010
DD109 Claims Based AuthN in SharePoint 2010DD109 Claims Based AuthN in SharePoint 2010
DD109 Claims Based AuthN in SharePoint 2010
Spencer Harbar
 
Luminis Iv To Exchange Labs
Luminis Iv To Exchange LabsLuminis Iv To Exchange Labs
Luminis Iv To Exchange Labs
Melissa Miller
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
rhassan84
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
rhassan84
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel Oleson
Joel Oleson
 
SharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel OlesonSharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel Oleson
webhostingguy
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
Information Security Services SA
 
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
Nuno Árias Silva
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
Presentologics
 
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
Nuno Árias Silva
 
Hybrid SharePoint - Office 365 & On-prem SharePoint 2013 -part2
Hybrid SharePoint - Office 365 & On-prem SharePoint 2013 -part2Hybrid SharePoint - Office 365 & On-prem SharePoint 2013 -part2
Hybrid SharePoint - Office 365 & On-prem SharePoint 2013 -part2
WinWire Technologies Inc
 
Claims-Based Identity in SharePoint 2010
Claims-Based Identity in SharePoint 2010Claims-Based Identity in SharePoint 2010
Claims-Based Identity in SharePoint 2010
Danny Jessee
 
Understanding SharePoint Apps, authentication and authorization infrastructur...
Understanding SharePoint Apps, authentication and authorization infrastructur...Understanding SharePoint Apps, authentication and authorization infrastructur...
Understanding SharePoint Apps, authentication and authorization infrastructur...
SPC Adriatics
 
sharepoint.microsoft.com
sharepoint.microsoft.comsharepoint.microsoft.com
sharepoint.microsoft.com
webhostingguy
 
Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)
Microsoft Norge AS
 
Azure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protectionsAzure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protections
Andres Canello
 
ObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT
 

Similar to Why Cant I Access The Portal (20)

Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
 
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
 
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
 
DD109 Claims Based AuthN in SharePoint 2010
DD109 Claims Based AuthN in SharePoint 2010DD109 Claims Based AuthN in SharePoint 2010
DD109 Claims Based AuthN in SharePoint 2010
 
Luminis Iv To Exchange Labs
Luminis Iv To Exchange LabsLuminis Iv To Exchange Labs
Luminis Iv To Exchange Labs
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel Oleson
 
SharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel OlesonSharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel Oleson
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
 
Hybrid SharePoint - Office 365 & On-prem SharePoint 2013 -part2
Hybrid SharePoint - Office 365 & On-prem SharePoint 2013 -part2Hybrid SharePoint - Office 365 & On-prem SharePoint 2013 -part2
Hybrid SharePoint - Office 365 & On-prem SharePoint 2013 -part2
 
Claims-Based Identity in SharePoint 2010
Claims-Based Identity in SharePoint 2010Claims-Based Identity in SharePoint 2010
Claims-Based Identity in SharePoint 2010
 
Understanding SharePoint Apps, authentication and authorization infrastructur...
Understanding SharePoint Apps, authentication and authorization infrastructur...Understanding SharePoint Apps, authentication and authorization infrastructur...
Understanding SharePoint Apps, authentication and authorization infrastructur...
 
sharepoint.microsoft.com
sharepoint.microsoft.comsharepoint.microsoft.com
sharepoint.microsoft.com
 
Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)
 
Azure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protectionsAzure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protections
 
ObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate Presentation
 

More from Dan Usher

SPS Pittsburgh - Getting Started with Office 365
SPS Pittsburgh - Getting Started with Office 365SPS Pittsburgh - Getting Started with Office 365
SPS Pittsburgh - Getting Started with Office 365
Dan Usher
 
SPS NYC - Getting started with Office 365 for IT Pros
SPS NYC - Getting started with Office 365 for IT ProsSPS NYC - Getting started with Office 365 for IT Pros
SPS NYC - Getting started with Office 365 for IT Pros
Dan Usher
 
2014 09-20 - SPSNJ - Worst Practices of SharePoint
2014 09-20 - SPSNJ - Worst Practices of SharePoint2014 09-20 - SPSNJ - Worst Practices of SharePoint
2014 09-20 - SPSNJ - Worst Practices of SharePoint
Dan Usher
 
2014 09-20 - SPSNJ - Getting Started with Office 365
2014 09-20 - SPSNJ - Getting Started with Office 3652014 09-20 - SPSNJ - Getting Started with Office 365
2014 09-20 - SPSNJ - Getting Started with Office 365
Dan Usher
 
SPTechCon 2014 - Boston - Worst practices of SharePoint
SPTechCon 2014 - Boston - Worst practices of SharePointSPTechCon 2014 - Boston - Worst practices of SharePoint
SPTechCon 2014 - Boston - Worst practices of SharePoint
Dan Usher
 
SPTechCon - Boston 2014 - Getting started with Office 365
SPTechCon - Boston 2014 - Getting started with Office 365SPTechCon - Boston 2014 - Getting started with Office 365
SPTechCon - Boston 2014 - Getting started with Office 365
Dan Usher
 
2014 08-15 - Getting Started with Office 365 - Office 365 Ramp Up
2014 08-15 - Getting Started with Office 365 - Office 365 Ramp Up2014 08-15 - Getting Started with Office 365 - Office 365 Ramp Up
2014 08-15 - Getting Started with Office 365 - Office 365 Ramp Up
Dan Usher
 
SPSNYC 2014 - Authentication and Authorization
SPSNYC 2014 - Authentication and AuthorizationSPSNYC 2014 - Authentication and Authorization
SPSNYC 2014 - Authentication and Authorization
Dan Usher
 
2014 05-19 - getting started with office 365.release
2014 05-19 - getting started with office 365.release2014 05-19 - getting started with office 365.release
2014 05-19 - getting started with office 365.release
Dan Usher
 
2014-05-17 SPS Baltimore - Worst Practices of SharePoint
2014-05-17 SPS Baltimore - Worst Practices of SharePoint2014-05-17 SPS Baltimore - Worst Practices of SharePoint
2014-05-17 SPS Baltimore - Worst Practices of SharePoint
Dan Usher
 
2014-005-17 SPS Baltimore - Getting Started with Office 365
2014-005-17 SPS Baltimore - Getting Started with Office 3652014-005-17 SPS Baltimore - Getting Started with Office 365
2014-005-17 SPS Baltimore - Getting Started with Office 365
Dan Usher
 
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the Cloud
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the CloudSharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the Cloud
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the Cloud
Dan Usher
 
SharePoint Intersections - SP10 - Getting Started with Office 365 - Identity,...
SharePoint Intersections - SP10 - Getting Started with Office 365 - Identity,...SharePoint Intersections - SP10 - Getting Started with Office 365 - Identity,...
SharePoint Intersections - SP10 - Getting Started with Office 365 - Identity,...
Dan Usher
 
SharePoint Intersections - SP09 - Introduction to SharePoint 2013 for IT Pros
SharePoint Intersections - SP09 - Introduction to SharePoint 2013 for IT ProsSharePoint Intersections - SP09 - Introduction to SharePoint 2013 for IT Pros
SharePoint Intersections - SP09 - Introduction to SharePoint 2013 for IT Pros
Dan Usher
 
2014-04-05 - SPSPhilly - Authentication and Authorization
2014-04-05 - SPSPhilly - Authentication and Authorization2014-04-05 - SPSPhilly - Authentication and Authorization
2014-04-05 - SPSPhilly - Authentication and Authorization
Dan Usher
 
2014-04-05 - SPSPhilly - Getting Started with Office 365
2014-04-05 - SPSPhilly - Getting Started with Office 3652014-04-05 - SPSPhilly - Getting Started with Office 365
2014-04-05 - SPSPhilly - Getting Started with Office 365
Dan Usher
 
2014-03-20 - Baltimore SharePoint Users Group - Getting Started with Office 365
2014-03-20 - Baltimore SharePoint Users Group - Getting Started with Office 3652014-03-20 - Baltimore SharePoint Users Group - Getting Started with Office 365
2014-03-20 - Baltimore SharePoint Users Group - Getting Started with Office 365
Dan Usher
 
2014 03-19 - CapArea.net SSIG - Getting Started with Office 365
2014 03-19 - CapArea.net SSIG - Getting Started with Office 3652014 03-19 - CapArea.net SSIG - Getting Started with Office 365
2014 03-19 - CapArea.net SSIG - Getting Started with Office 365
Dan Usher
 
2014-03-13 - Getting Started with Office 365 at SUGDC
2014-03-13 - Getting Started with Office 365 at SUGDC2014-03-13 - Getting Started with Office 365 at SUGDC
2014-03-13 - Getting Started with Office 365 at SUGDC
Dan Usher
 
2014 02-26 - Princeton SUG presents - Getting Started with Office 365
2014 02-26 - Princeton SUG presents - Getting Started with Office 3652014 02-26 - Princeton SUG presents - Getting Started with Office 365
2014 02-26 - Princeton SUG presents - Getting Started with Office 365
Dan Usher
 

More from Dan Usher (20)

SPS Pittsburgh - Getting Started with Office 365
SPS Pittsburgh - Getting Started with Office 365SPS Pittsburgh - Getting Started with Office 365
SPS Pittsburgh - Getting Started with Office 365
 
SPS NYC - Getting started with Office 365 for IT Pros
SPS NYC - Getting started with Office 365 for IT ProsSPS NYC - Getting started with Office 365 for IT Pros
SPS NYC - Getting started with Office 365 for IT Pros
 
2014 09-20 - SPSNJ - Worst Practices of SharePoint
2014 09-20 - SPSNJ - Worst Practices of SharePoint2014 09-20 - SPSNJ - Worst Practices of SharePoint
2014 09-20 - SPSNJ - Worst Practices of SharePoint
 
2014 09-20 - SPSNJ - Getting Started with Office 365
2014 09-20 - SPSNJ - Getting Started with Office 3652014 09-20 - SPSNJ - Getting Started with Office 365
2014 09-20 - SPSNJ - Getting Started with Office 365
 
SPTechCon 2014 - Boston - Worst practices of SharePoint
SPTechCon 2014 - Boston - Worst practices of SharePointSPTechCon 2014 - Boston - Worst practices of SharePoint
SPTechCon 2014 - Boston - Worst practices of SharePoint
 
SPTechCon - Boston 2014 - Getting started with Office 365
SPTechCon - Boston 2014 - Getting started with Office 365SPTechCon - Boston 2014 - Getting started with Office 365
SPTechCon - Boston 2014 - Getting started with Office 365
 
2014 08-15 - Getting Started with Office 365 - Office 365 Ramp Up
2014 08-15 - Getting Started with Office 365 - Office 365 Ramp Up2014 08-15 - Getting Started with Office 365 - Office 365 Ramp Up
2014 08-15 - Getting Started with Office 365 - Office 365 Ramp Up
 
SPSNYC 2014 - Authentication and Authorization
SPSNYC 2014 - Authentication and AuthorizationSPSNYC 2014 - Authentication and Authorization
SPSNYC 2014 - Authentication and Authorization
 
2014 05-19 - getting started with office 365.release
2014 05-19 - getting started with office 365.release2014 05-19 - getting started with office 365.release
2014 05-19 - getting started with office 365.release
 
2014-05-17 SPS Baltimore - Worst Practices of SharePoint
2014-05-17 SPS Baltimore - Worst Practices of SharePoint2014-05-17 SPS Baltimore - Worst Practices of SharePoint
2014-05-17 SPS Baltimore - Worst Practices of SharePoint
 
2014-005-17 SPS Baltimore - Getting Started with Office 365
2014-005-17 SPS Baltimore - Getting Started with Office 3652014-005-17 SPS Baltimore - Getting Started with Office 365
2014-005-17 SPS Baltimore - Getting Started with Office 365
 
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the Cloud
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the CloudSharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the Cloud
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the Cloud
 
SharePoint Intersections - SP10 - Getting Started with Office 365 - Identity,...
SharePoint Intersections - SP10 - Getting Started with Office 365 - Identity,...SharePoint Intersections - SP10 - Getting Started with Office 365 - Identity,...
SharePoint Intersections - SP10 - Getting Started with Office 365 - Identity,...
 
SharePoint Intersections - SP09 - Introduction to SharePoint 2013 for IT Pros
SharePoint Intersections - SP09 - Introduction to SharePoint 2013 for IT ProsSharePoint Intersections - SP09 - Introduction to SharePoint 2013 for IT Pros
SharePoint Intersections - SP09 - Introduction to SharePoint 2013 for IT Pros
 
2014-04-05 - SPSPhilly - Authentication and Authorization
2014-04-05 - SPSPhilly - Authentication and Authorization2014-04-05 - SPSPhilly - Authentication and Authorization
2014-04-05 - SPSPhilly - Authentication and Authorization
 
2014-04-05 - SPSPhilly - Getting Started with Office 365
2014-04-05 - SPSPhilly - Getting Started with Office 3652014-04-05 - SPSPhilly - Getting Started with Office 365
2014-04-05 - SPSPhilly - Getting Started with Office 365
 
2014-03-20 - Baltimore SharePoint Users Group - Getting Started with Office 365
2014-03-20 - Baltimore SharePoint Users Group - Getting Started with Office 3652014-03-20 - Baltimore SharePoint Users Group - Getting Started with Office 365
2014-03-20 - Baltimore SharePoint Users Group - Getting Started with Office 365
 
2014 03-19 - CapArea.net SSIG - Getting Started with Office 365
2014 03-19 - CapArea.net SSIG - Getting Started with Office 3652014 03-19 - CapArea.net SSIG - Getting Started with Office 365
2014 03-19 - CapArea.net SSIG - Getting Started with Office 365
 
2014-03-13 - Getting Started with Office 365 at SUGDC
2014-03-13 - Getting Started with Office 365 at SUGDC2014-03-13 - Getting Started with Office 365 at SUGDC
2014-03-13 - Getting Started with Office 365 at SUGDC
 
2014 02-26 - Princeton SUG presents - Getting Started with Office 365
2014 02-26 - Princeton SUG presents - Getting Started with Office 3652014 02-26 - Princeton SUG presents - Getting Started with Office 365
2014 02-26 - Princeton SUG presents - Getting Started with Office 365
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

Why Cant I Access The Portal

  • 1. Why can’t I access the portal?SharePoint Authentication 101 Dan Usher 25 July 2009
  • 2. Agenda Introductions A brief primer on A&A history Approaches to Authentication with SharePoint Extending into the Extranet What works best and where? Pain Points Worst Practices to Avoid Conclusions
  • 3. Who am I? Dan Usher Booz Allen Hamilton, Associate SharePoint Architect & Implementation Engineer MCP, Security+, MCTS
  • 4. Introductions What environments have I worked in? What have I seen? What is this talk about? Who are you all? 
  • 5. A very brief primer on A&A Identification (n) - process of establishing who someone or something claims to be Authentication (n) - certification, validating the authenticity of something or someone Authorization (n) - a document giving an official instruction or command What’s the confusion?
  • 6. Basics of SharePoint Authentication Out of the box IIS basics Authentication is handled by IIS and ASP.NET Checks user against Active Directory, Local Machine accounts, or other auth provider Passes verification to IIS to proceed Source: http://go.spdan.com/iisauth ASP.NET Authentication
  • 7. Approaches to Auth with SharePoint Integrated Windows Authentication Forms Based Authentication Custom Membership Provider ADFS and Geneva Third Party SSO/RSO Smart Card
  • 8. Integrated Windows Authentication NTLM Challenge Response Default SharePoint authentication schema Kerberos (Negotiate) Symmetric key cryptography Requires a little more configuration Server Delegation Account Delegation Security Principle Names
  • 10. Two SharePoint Consultants enter a bar… NTLM - hand your ID every time you want a drink Kerberos - hand your ID the first time at the door and it’s passed transparently in the background for you Anonymous Access - equivalent of an open bar at a wedding, no one really asks…
  • 11. So what’s this mean to my end user? Performance Caching Large Environments Security Client-Server || Server-Client Delegation RSS Feeds Excel Calculation Services Double Hops Smartcards
  • 12. Forms Based Authentication MOSS LDAP V3 Membership Provider SQL Membership Provider ASP.net v2 Membership Providers Smartcard and SQL Hybrid
  • 13. How’s FBA Effect me? Client Integration Content Crawling SP2 + Hotfixes http://go.spdan.com/fba-issues
  • 14. Active Directory Federated Services Provides for Web-SSO Allows for federation between Forests / Domains Requires a policy file between Web-SSO servers Disables Client Integration by default
  • 15. Thoughts on ADFS and Client Integration SharePoint becomes an island Bring in users from other organizations FBA Updates Requires hotfixes on the server Requires an additional HTTP handler Requires hotfixes on XP, or SP2 on Vista
  • 16. Geneva and Claims Based Authentication Geneva Framework -> Windows Identity Foundation Geneva Server -> Active Directory Federation Services Windows Cardspace Geneva -> Windows Cardspace Utilizes WS-* and SAML 2.0 protocols Provides for security token service (STS)
  • 17. Geneva and End Users Beta is available from Connect Will solve client integration issues Will allow for greater federation
  • 18. Third Party SSO/RSO CA SiteMinder Tivoli Ping Federate Version 3 Enhanced Authentication
  • 19. SmartCard Authentication Simplicity… Source: http://go.spdan.com/pki
  • 21. So why SmartCards? Simplicity… to the end user Provides a secure tamper resistant storage physical token Enables portability of credentials and private information similar to other Federated Identity… …like OpenID, Facebook Connect, Google OpenSocial, Microsoft Hailstorm A PIN is used …Security
  • 22. User Experience Pitfalls of SmartCard Auth OCSP or CRL checking could cause authentication to fail if CRL is not available Depending on number of requests, CRL checking could cause server load Puts server in DMZ, increases attack surface area – wfetch will show your SharePoint Version User’s account must be linked to their SmartCard user principal name User selecting certificate that does not contain UPN
  • 23. Extending into the Extranet ISA Server 2006 Intelligent Application Gateway Separate Domains and Trusts User Experience Complexity Increases
  • 24. Microsoft External Collaboration Toolkit for SharePoint http://go.spdan.com/setc Planning Guide Deployment and Operations Guide Information Materials Solutions Accelerator AD & ADAM
  • 25. Microsoft ISA Server 2006 Soon to be Forefront Threat Management Gateway Integrated network edge security gateway to defend against: Web based threats Securely Publish Content for Remote Access Securely Connect Branch Offices Provides: Constrained Kerberos Delegation URL Masking of web servers Smart Card Authentication SSL Termination
  • 26. Microsoft Intelligent Application Gateway Soon to be Forefront Unified Application Gateway Remote Access Gateway that provides secure access to applications Provides: SSL VPN access capabilities Similar to a regular VPN without a client Web Application firewall Endpoint Security Compliance Checking Persistent User Caching Smartcard Authentication ISA 2006 Capabilities
  • 27. Third Party Extranet Applications Epok Edition for Microsoft SharePoint SharePoint Solutions - Extranet Collaboration Manager Version 3 Enhanced Authentication
  • 28. What works best and where? NTLM Authentication via IP Address Authentication to server within a different Forest or domain No Active Directory exists Limited Firewall Ports Kerberos Authentication within a network boundary Timing of servers is closely coupled Authentication to servers within a single Forest or domain
  • 29. But I still can’t get in, what gives?
  • 30. SharePoint Policy Issues Web Application Policy set to deny all Web Application All Authenticated Users Removed SharePoint Groups removed
  • 31. Account Issues SmartCard Enabled Accounts Account aging Smart Card UPN does not match User Account UPN Smart Card Choosing the wrong certificate Local User Groups and Accounts Used
  • 32. Infrastructure Group Policy and effects on service accounts Active Directory Offline Server time > 5 minutes difference Domains and Database Migrations SharePoint Groups Inheritance Domains, Trusts, Root Suffixes…
  • 33. Development and Branding Branding Issues User Permissions (IIS_WPG) Reference files in other sites Master page tokens Development Issues Impersonation / Elevated Privileges Web Services
  • 34. Avoiding Catastrophe Documentation, documentation, documentation… Staging and Testing Procedures for new features, solutions, etc. Configuration Management Policies and Procedures Tools installed (SPAdminToolkit, etc.) Planned Service Accounts
  • 35. Conclusions It’s not always that SharePoint is down Sometimes SharePoint is misconfigured More often than not, it’s user awareness and site configuration
  • 37. Follow me on Twitter – twitter.com/usher Follow my blog – http://www.sharepointdan.com IM? gTalk danusher79 Live danusher@live.com E-mail: dan@spdan.com And that’s a wrap…

Editor's Notes

  1. Step by Step of how a user authenticates to a SharePoint site, mentioning the .NET virtual path provider and the content database relative tables with the associated GUIDs that are based off of a user’s AD SID + SAMAccountNameAuthentication with integrated authentication ADHow’s your browser setup for passing credentials… IE 6 vs. IE 7 (and 8), FirefoxThe diagram above shows ASP.NET authentication. Also seehttp://go.spdan.com/iisauth for NTLM/Kerberoshttp://go.spdan.com/formsauth for Forms Based Authentication
  2. RSS Feeds for cross site authentication will failTo be able to utilize Excel Calculation Services
  3. It’s so simple, isn’t it?For an individual to go and access a site that requires some sort of certificate authentication requires the user to register with a registration authority (RA) like Verisign, Thawte, Entrust, or one of several other certificate providers. Once the individual has been verified, a certificate authority provides the individual a certificate.In the process of providing that certificate, the certificate authority alerts the verification authority of the new user.When the user attempts to connect to the site requiring a certificate, they present their public key to the site which is then verified by the verification authority (VA) which in turn allows the individual access.
  4. SmartCardauth with middleware, pass cert to IIS, UPN mapped to UPN user object, authenticated. IIS passes to virtual path provider and SharePoint and we’re on our way.Client certificate required through IISKerberos token through AD / Windows Networking InfrastructureClient certificate required through ISAReference: http://go.spdan.com/SmartCardConcepts
  5. You’re not stove piped to a single system – how many different user names and passwords do you have within your organization? They probably vary from system to system in terms of what is required, how long the username can be, if it’s just your e-mail address, what the complexity of the password is. Call it an SSO if you like, though it’s not really, but it is at the same time, all your accounts are linked to one common identityAll you need is a token with a common identity…It’s linked to your account that resides within a windows networking infrastructure domain through the user principal name which is a property of the SmartCard and happens to be the same thing as your user account.It’s similar to Federated Identity, but different. It’s merely an identifier. There still has to be a user account on the system linked and then integrated with the other systems that are attempting to make use of it. It’s similar in that like OpenID, Facebook Connect, Google OpenSocial, of Microsoft Hailstorm, it’s a single identity that you carry with you everywhere.PIN or a passphrase – something short and sweet, but it requires that the token actually be there. No longer are you having to remember if it’s something that’s case sensitive or whether it changed last week or the day beforeSo what about the PIN being compromised, well, not to worry, typically there’s a policy set around this… a few strikes and the card is physically locked, you can’t use it anywhere else.A reader is required – again, you’ve already required that there be a token present, but now you’re also requiring additional hardware be there that’s standards based so that you’re able to authenticate. If some low lying scum steals your card and thinks that they’re going to cash in on it, more than likely they won’t have a card reader so they won’t necessarily be able to get into your identity, card locked, all is well.A trusted certificate – so on that card, there’s a little more than meets the eye. More than likely to associate the card with a particular organization there’s a certificate that’s linked to the organizations certificate establishing a community of trust.
  6. Rather intensive work for the server to handle certificatesRequires Active DirectoryOCSP = Online Certificate Status ProtocolCRL = Certificate Revocation List