SlideShare a Scribd company logo
AUTHENTICATION, AUTHORIZ
ATION AND IDENTITY…
IT’S MORE THAN MEETS THE EYE
Scott Hoag and Dan Usher
PRINCETON SHAREPOINT USER GROUP
• Different SharePoint discussions each
month on various topics. Announced on
meetup.com
• Meets 4th Wednesday of every month
• 6pm – 8pm
• Infragistics Office
• 2 Commerce Drive, Cranbury, NJ
• http://www.meetup.com/princetonSUG
• http://www.princetonsug.com
THANK YOU
EVENT
SPONSORS
• Platinum & Gold sponsors
have tables here in the
Fireside Lounge
• Please visit them and
inquire about their
products & services
• To be eligible for prizes
make sure your bingo card
is signed by all
Platinum/Gold
WHO ARE WE?
Scott Hoag
@ciphertxt
Applied Information Sciences
Infrastructure Consultant
scott.hoag@appliedis.com
• Dan Usher
• @binarybrewery
• Booz Allen Hamilton Incorporated
• Lead Associate
• usher_daniel@bah.com
Authentication, Authorization, and Identity – More than meets the eye…
Authentication, Authorization, and Identity – More than meets the eye…
HOUSEKEEPING
• Phones silenced, phasers set to stun
• Ask questions
• Please remember to turn in your filled out bingo cards and event evaluations for prizes.
• Follow SharePoint Saturday New Jersey on Twitter @spsnj and hashtag #spsnj
• Do not feed Scott donuts…
THINGS TO COVER
THINGS WE WON’T BE COVERING
http://go.spdan.com/kerberos2010
http://go.spdan.com/kerberos2013
http://go.spdan.com/multihopwinrm
SECURITY
SPOILER ALERT!!!
http://xkcd.com/1240/
SECURITY IN GENERAL
SECURITY IN GENERAL
SECURITY CONCERNS IN TODAY’S WORLD
IDENTIFICATION – WHAT IS?
IDENTIFICATION – TYPES OF…
HOW DO WE PROTECT IDENTITY?
AUTHENTICATION – WHAT IS?
AUTHORIZATION – WHAT IS?
• The act of authorizing.
• Permission or power granted by an authority; sanction.
• To give authority or official power to.
• To give authority for; formally sanction (an act or
proceeding).
• To establish by authority or usage.
• Sometimes we call it AuthZ.
SECURITY WITH SHAREPOINT
SECURITY WITH SHAREPOINT
AUTHN – TYPES OF…
• Windows
• NTLM/Kerberos
• Basic
• Anonymous
• Digest
• Client Certificate
• Forms-based Authentication
• Lightweight Directory Access
Protocol (LDAP)
• Microsoft SQL Server
• ASP.NET Membership and Role
Providers
AUTHN – STILL MORE TYPES OF…
• SAML Token-based Authentication
• Active Directory Federated Services
• 3rd Party Identity Provider
• Lightweight Directory Access Protocol (LDAP)
AUTHENTICATION VS. AUTHORIZATION
AUTHN VS. AUTHZ (CONTINUED)
AUTHENTICATION – CLAIM TERMINOLOGY
• Identity
• Info about a Person or Object
(AD, Google, Windows Live, Facebook
etc.)
• Claim
• Attributes of the Identity (User
ID, Email, Age etc.)
• Token
• Binary Representation of Identity
• Set of Claims and the Signature
• Relying Party (aka RP)
• Users Token
• Secure Token Service (STS)
• Issuer of Tokens for Users
• SharePoint 2010 Introduced Claims
Authentication
• What is this? http://go.spdan.com/cba
AUTHENTICATION - CLAIMS
AUTHENTICATION - CLAIMS
WHAT ABOUT CLAIMS IN WINDOWS?
WHAT DOES CLAIMS ENCODING LOOK LIKE?
http://go.spdan.com/claimsencoding
WHAT DOES CLAIMS ENCODING LOOK LIKE?
http://go.spdan.com/claimsencoding
BASICS OF SHAREPOINT CLASSIC AUTHN
Source:http://go.spdan.com/iisauth
ASP.NETAuthentication
BASICS OF SHAREPOINT CLAIMS AUTHN
1. Resource Requested
2. AuthN Request / Redirect
3. AuthN Request
4. Security Token
5. Security Token Request
6. Service Token
7. Resource Request w/Service Token
8. Resource Sent
Identity Provider
Security Token Service
aka IP-STS
SharePoint 2010
aka RP
SIDE STORY
A SHAREPOINT CONSULTANTS ENTER A BAR…
Authentication, Authorization, and Identity – More than meets the eye…
AUTHN - MEMBERSHIP & ROLE PROVIDERS
AUTHN - MEMBERSHIP & ROLE PROVIDERS
AUTHN – CUSTOM IDENTITY PROVIDER
AUTHN – CUSTOM IDENTITY PROVIDER
AUTHN - PROXY SERVER
AUTHN - DIRECT ACCESS
WINDOWS AZURE ACTIVE DIRECTORY
WINDOWS AZURE ACTIVE DIRECTORY
IDENTITY PROVIDERS
https://sts.domain.com
AUTHZ
SHAREPOINT AUTHZ
Anonymous
Authentication
Is In Site Group?
Does user have claim attribute?
Web Application / Site Collection
Secured Site / Site Collection / Content
Content Repository
Content
AUTHZ - LIMITING ACCESS CONTROL
AUTHZ - OFFICE 365 AND EXTERNAL USERS
AUTHZ - OFFICE 365 AND EXTERNAL USERS
EXPECT THE UNEXPECTED
REAL WORLD
WHAT DO I DO WHERE?
SECURITY IN THE REAL WORLD
• Expect the unexpected
• People will find a way to circumvent your
security
• Give users minimal permission
• Starting with Less is good
• Add functionality through permission as
needed
• Be prepared to secure at all levels
• Web Application
• Site Collection
• Site
• List or Library
• Item
• Use roles from Provider
• Active Directory Groups
• Membership and Role Provider Roles
• Claims
QUESTIONS
CATCH UP WITH US…
Usher_Daniel@bah.com
@binarybrewery
www.sharepointdan.com
Scott.hoag@appliedis.com
@ciphertxt
http://psconfig.com
THANK YOU
EVENT
SPONSORS
• Platinum & Gold sponsors
have tables here in the
Fireside Lounge
• Please visit them and
inquire about their
products & services
• To be eligible for prizes
make sure your bingo card
is signed by all
Platinum/Gold

More Related Content

PPTX
Performance in .net best practices
PPTX
Scalable Resilient Web Services In .Net
PPTX
Web API authentication and authorization
PPTX
ZZ BC#8 Hello ASP.NET MVC 4 (dks)
PPTX
Iasi code camp 12 october 2013 corneliu rimboiu - bridging java and .net
PPTX
Asp.net mvc security
PPTX
DDD Melbourne 2014 security in ASP.Net Web API 2
PPT
Smooth Sort
Performance in .net best practices
Scalable Resilient Web Services In .Net
Web API authentication and authorization
ZZ BC#8 Hello ASP.NET MVC 4 (dks)
Iasi code camp 12 october 2013 corneliu rimboiu - bridging java and .net
Asp.net mvc security
DDD Melbourne 2014 security in ASP.Net Web API 2
Smooth Sort

Viewers also liked (17)

PDF
Secure RESTful Web Services for ASP.NET Web API
PDF
Design & Deploy a data-driven Web API in 2 hours
PPTX
End to End Security with MVC and Web API
PPTX
Building Scalable .NET Web Applications
PDF
Tips and Tricks For Faster Asp.NET and MVC Applications
PPTX
ASP.NET Core 1.0 Overview: Post-RC2
PPTX
Overview of the .Net Collection Framework and Immutable Collections
PDF
5. web api 2 aspdotnet-mvc5-slides
PPTX
ASP.NET Core MVC + Web API with Overview (Post RC2)
PPTX
Scaling asp.net websites to millions of users
PPTX
10 performance and scalability secrets of ASP.NET websites
PPTX
ASP.NET Mvc 4 web api
PPTX
Learning ASP.NET 5 and MVC 6
PPTX
ASP.NET MVC Performance
PPTX
Web API or WCF - An Architectural Comparison
PPTX
Rest API Security
PPTX
Securing RESTful APIs using OAuth 2 and OpenID Connect
Secure RESTful Web Services for ASP.NET Web API
Design & Deploy a data-driven Web API in 2 hours
End to End Security with MVC and Web API
Building Scalable .NET Web Applications
Tips and Tricks For Faster Asp.NET and MVC Applications
ASP.NET Core 1.0 Overview: Post-RC2
Overview of the .Net Collection Framework and Immutable Collections
5. web api 2 aspdotnet-mvc5-slides
ASP.NET Core MVC + Web API with Overview (Post RC2)
Scaling asp.net websites to millions of users
10 performance and scalability secrets of ASP.NET websites
ASP.NET Mvc 4 web api
Learning ASP.NET 5 and MVC 6
ASP.NET MVC Performance
Web API or WCF - An Architectural Comparison
Rest API Security
Securing RESTful APIs using OAuth 2 and OpenID Connect
Ad

Similar to Authentication, Authorization, and Identity – More than meets the eye… (20)

PPTX
SharePoint Authentication And Authorization SPTechCon San Francisco
PDF
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
PPTX
SharePoint Saturday Utah - Do you claim to be from the Azure Sky?
PPTX
SharePoint Saturday Austin - Share point authentication and authorization
PPTX
SPSBE 2013 Claims for devs
PPTX
SharePoint Authentication and Authorization
PPTX
SharePoint Authentication and Authorization
PDF
Introduction to claims based authentication in share point 2010
PDF
Claims based authentication in SharePoint 2010 - SharePoint Saturday Vietnam
PPTX
NIC 2014 Modern Authentication for the Cloud Era
PDF
Understanding Claim based Authentication
PDF
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
PPTX
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
PPTX
DD109 Claims Based AuthN in SharePoint 2010
PPTX
How to deploy SharePoint 2010 to external users?
PPTX
SPSNYC - Authentication, Authorization, and Identity – More than meets the eye…
PPTX
T28 implementing adfs and hybrid share point
PPTX
Claim Based Authentication in SharePoint 2010 for Community Day 2011
PPTX
SharePoint Access Control and Claims Based Authentication
PPTX
SharePoint, ADFS and Claims Auth
SharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday Utah - Do you claim to be from the Azure Sky?
SharePoint Saturday Austin - Share point authentication and authorization
SPSBE 2013 Claims for devs
SharePoint Authentication and Authorization
SharePoint Authentication and Authorization
Introduction to claims based authentication in share point 2010
Claims based authentication in SharePoint 2010 - SharePoint Saturday Vietnam
NIC 2014 Modern Authentication for the Cloud Era
Understanding Claim based Authentication
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
DD109 Claims Based AuthN in SharePoint 2010
How to deploy SharePoint 2010 to external users?
SPSNYC - Authentication, Authorization, and Identity – More than meets the eye…
T28 implementing adfs and hybrid share point
Claim Based Authentication in SharePoint 2010 for Community Day 2011
SharePoint Access Control and Claims Based Authentication
SharePoint, ADFS and Claims Auth
Ad

More from Scott Hoag (20)

PPTX
SharePoint Conference 2018 - Understanding Office 365 Usage Reporting
PPTX
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
PDF
Global Azure Bootcamp 2018 - Azure Security Center
PDF
Global Azure Bootcamp 2018 - Azure Network Security
PPTX
SPIntersection 2016 - TO THE CLOUD! USING IAAS AS A HOSTING PROVIDER FOR SHAR...
PPTX
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
PPTX
JAXSPUG April 2016 - Staying in the Know with Office 365
PDF
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
PPTX
SPSDC - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
PPTX
SPSNYC SharePoint Worst Practices
PPTX
March Sydney Office 365 Meetup - Office 365 and Hybrid Solutions... what work...
PPTX
SYDSP - Office 365 and Cloud Identity - What does it mean for me?
PPTX
SPSVB - Office 365 and Hybrid Solutions... what works for my organization?
PPTX
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
PPTX
SPSVB - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
PPTX
SPS Sydney - To the Cloud! Utilising Azure as a Cloud Hosting Provider for Sh...
PPTX
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?
PPTX
SPSCBR - Pitfalls of Migrating to SharePoint 2013
PDF
Office 365 and Cloud Identity – What Does It Mean For Me?
PPTX
Canberra SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013
SharePoint Conference 2018 - Understanding Office 365 Usage Reporting
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
Global Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Network Security
SPIntersection 2016 - TO THE CLOUD! USING IAAS AS A HOSTING PROVIDER FOR SHAR...
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
JAXSPUG April 2016 - Staying in the Know with Office 365
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
SPSDC - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
SPSNYC SharePoint Worst Practices
March Sydney Office 365 Meetup - Office 365 and Hybrid Solutions... what work...
SYDSP - Office 365 and Cloud Identity - What does it mean for me?
SPSVB - Office 365 and Hybrid Solutions... what works for my organization?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - To the Cloud! Using IaaS as a Hosting Provider for SharePoint
SPS Sydney - To the Cloud! Utilising Azure as a Cloud Hosting Provider for Sh...
SPS Sydney - Office 365 and Cloud Identity – What does it mean for me?
SPSCBR - Pitfalls of Migrating to SharePoint 2013
Office 365 and Cloud Identity – What Does It Mean For Me?
Canberra SPUG - February 2014 - Pitfalls of Migrating to SharePoint 2013

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
Teaching material agriculture food technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Empathic Computing: Creating Shared Understanding
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Big Data Technologies - Introduction.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Teaching material agriculture food technology
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation_ Review paper, used for researhc scholars
Empathic Computing: Creating Shared Understanding
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation theory and applications.pdf
Understanding_Digital_Forensics_Presentation.pptx
Machine learning based COVID-19 study performance prediction
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Reach Out and Touch Someone: Haptics and Empathic Computing

Authentication, Authorization, and Identity – More than meets the eye…

Editor's Notes

  • #8: Dan
  • #9: Dan
  • #10: Dan/Scott
  • #12: Scott
  • #13: Scott
  • #14: Scott
  • #15: Dan
  • #16: Scott
  • #17: Dan
  • #18: Dan
  • #19: Scott
  • #20: Scott
  • #21: Danger Waterfall ahead
  • #22: Scott----- Meeting Notes (7/23/12 23:35) -----Thinking about administrators for SharePoint - what access do they have?
  • #23: Dan
  • #24: Dan
  • #25: Dan
  • #26: Dan
  • #27: Dan/Scott
  • #28: ScottStandards based: Wide SupportEasy to configure? Multiple Web Config changes, Web Application Changes and then of course the actual configuration of your identity provider
  • #29: Scott
  • #30: Dan
  • #31: Scott
  • #32: Scott
  • #33: Dan
  • #34: Dan
  • #35: Dan/Scott
  • #36: Dan
  • #38: Scott
  • #39: Scott
  • #40: Scott
  • #41: Scott
  • #42: Dan
  • #43: Dan
  • #44: DanCurious how to manage Windows Azure Active Directory through PowerShell? http://technet.microsoft.com/en-us/library/jj151815.aspx
  • #45: DanCurious how to manage Windows Azure Active Directory through PowerShell? http://technet.microsoft.com/en-us/library/jj151815.aspx
  • #46: Scott
  • #47: Scott
  • #48: ScottDifferent security boundaries and the permissions that can be applied to them.
  • #49: Dan
  • #50: Dan
  • #51: Dan
  • #52: Scott
  • #54: Dan
  • #55: Scott