Applications Server
 

Sharepoint 2013 : Security and Policy - SharePoint Users

11/13/2014 8:33:14 PM

Most security models assume the existence of users and groups of users. Different users require different sets of permissions to perform their work, depending on the level of access to data in the system.

At the basic level, a user of SharePoint is an “identity.” User identity typically consists of various attributes that describe the user with access to the SharePoint site collection. SharePoint retains minimal information about a user to distinguish one user from another, which typically involves the username, password, and display name from the credential store that the user authenticates (Active Directory). SharePoint 2007 classified users using either the Active Directory username DOMAIN\username or a username with membership provider prefix. SharePoint 2010, and now SharePoint 2013, uses Claims-Based-Authentication (CBA), which tracks user identity via abstract token.

Note  With the exception of administrators, SharePoint maintains topmost user security at the site collection level. Farm administrators must grant relevant access to users for each site collection in a web application.

Most users of SharePoint identify other users by the friendly display name, and, by default, Active Directory uses the first name and last name. Any object that I modify or own in SharePoint shows my name as “Rob Garrett,” but under the hood, SharePoint uses the username or unique token to identify my user identity.

Users have more than just username, password, and display name attributes in SharePoint.

SharePoint tracks each user added to a site collection in a hidden list at the root of the site collection. To view this list, type the following URL into your browser (replacing the domain name of the server, as appropriate): http://domain_name/_catalogs/users/. Figure 1 shows the user list from within my environment.

9781430249412_Fig07-06.jpg

Figure 1. All users in the site collection

 
Others
 
- Sharepoint 2013 : Security and Policy - Permissions and Permission Levels (part 2) - Creating Custom Permission Levels
- Sharepoint 2013 : Security and Policy - Permissions and Permission Levels (part 1)
- Sharepoint 2013 : Security and Policy - Security Administration
- Installing Exchange Server 2010 : Command-Line Setup (part 2) - Command-Line Server Recovery Options , Command-Line Delegated Server Installation , Installing Language Packs
- Installing Exchange Server 2010 : Command-Line Setup (part 1) - Command-Line Installation Options
- Installing Exchange Server 2010 : Graphical User Interface Setup
- Installing Exchange Server 2010 : Preparing for Exchange 2010 Ahead of Time (part 2) - Preparing the Active Directory Forest,Preparing Additional Domains
- Installing Exchange Server 2010 : Preparing for Exchange 2010 Ahead of Time (part 1) - Existing Exchange Organizations , Preparing the Schema
- Securing an Exchange Server 2007 Environment : Securing Outlook Web Access
- Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 2) - Filtering Junk Mail
 
 
Popular tags
 
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS
 
 
Top 10
 
- Microsoft Prohect 2010 : Capturing Project Progress (part 4) - Assessing the Impacts of Updates
- Microsoft Prohect 2010 : Capturing Project Progress (part 3) - Gathering Status Updates from Resources - Actual Work Per Day, Remaining Work, Expected Finish Date
- Microsoft Prohect 2010 : Capturing Project Progress (part 2) - Gathering Status Updates from Resources - Actual Start, Percent Work Complete, Remaining Work
- Microsoft Prohect 2010 : Capturing Project Progress (part 1) - Baselining Your Project
- Adobe Photoshop CS5 : Working with Layers - Using Smart Guides
- Adobe Photoshop CS5 : Working with Layers - Setting Layers Panel Options
- Adobe Photoshop CS5 : Working with Layers - Exporting Layers as Files
- Adobe Photoshop CS5 : Working with Layers - Working with the Layer Comps Panel
- Microsoft Access 2010 : Create Custom Forms (part 4) - Using E-Mail Forms to Collect Data
- Microsoft Access 2010 : Create Custom Forms (part 3) - Adding Subforms