IT tutorials
 
Applications Server
 

Sharepoint 2013 : Security and Policy - SharePoint Users

11/13/2014 8:33:14 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Most security models assume the existence of users and groups of users. Different users require different sets of permissions to perform their work, depending on the level of access to data in the system.

At the basic level, a user of SharePoint is an “identity.” User identity typically consists of various attributes that describe the user with access to the SharePoint site collection. SharePoint retains minimal information about a user to distinguish one user from another, which typically involves the username, password, and display name from the credential store that the user authenticates (Active Directory). SharePoint 2007 classified users using either the Active Directory username DOMAIN\username or a username with membership provider prefix. SharePoint 2010, and now SharePoint 2013, uses Claims-Based-Authentication (CBA), which tracks user identity via abstract token.

Note  With the exception of administrators, SharePoint maintains topmost user security at the site collection level. Farm administrators must grant relevant access to users for each site collection in a web application.

Most users of SharePoint identify other users by the friendly display name, and, by default, Active Directory uses the first name and last name. Any object that I modify or own in SharePoint shows my name as “Rob Garrett,” but under the hood, SharePoint uses the username or unique token to identify my user identity.

Users have more than just username, password, and display name attributes in SharePoint.

SharePoint tracks each user added to a site collection in a hidden list at the root of the site collection. To view this list, type the following URL into your browser (replacing the domain name of the server, as appropriate): http://domain_name/_catalogs/users/. Figure 1 shows the user list from within my environment.

9781430249412_Fig07-06.jpg

Figure 1. All users in the site collection

 
Others
 
- Sharepoint 2013 : Security and Policy - Permissions and Permission Levels (part 2) - Creating Custom Permission Levels
- Sharepoint 2013 : Security and Policy - Permissions and Permission Levels (part 1)
- Sharepoint 2013 : Security and Policy - Security Administration
- Installing Exchange Server 2010 : Command-Line Setup (part 2) - Command-Line Server Recovery Options , Command-Line Delegated Server Installation , Installing Language Packs
- Installing Exchange Server 2010 : Command-Line Setup (part 1) - Command-Line Installation Options
- Installing Exchange Server 2010 : Graphical User Interface Setup
- Installing Exchange Server 2010 : Preparing for Exchange 2010 Ahead of Time (part 2) - Preparing the Active Directory Forest,Preparing Additional Domains
- Installing Exchange Server 2010 : Preparing for Exchange 2010 Ahead of Time (part 1) - Existing Exchange Organizations , Preparing the Schema
- Securing an Exchange Server 2007 Environment : Securing Outlook Web Access
- Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 2) - Filtering Junk Mail
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us