Chapter overview: Plan site and content security (Project Server)

This Office product will reach end of support on October 10, 2017. To stay supported, you will need to upgrade. For more information, see , Resources to help you upgrade your Office 2007 servers and clients.

 

Topic Last Modified: 2016-11-14

This chapter covers planning for security in a Microsoft Office Project Server 2007 Enterprise Project Management (EPM) Solution. This material is useful for executives, managers, and system administrators who are responsible for planning the deployment of a Office Project Server 2007 EPM Solution.

The Office Project Server 2007 security model is based on the Windows security model, by which users and groups (security principals) are granted permissions to access security objects. The Office Project Server 2007 security model is designed to enable you to control and manage access to projects, resources, and reports stored in the Office Project Server 2007 database; Microsoft Office Project Web Access pages; and features that are available in Microsoft Office Project Professional 2007 and Office Project Web Access. In addition, the security architecture enables you to manage a large number of users and projects easily by assigning permissions to groups of users and unique categories. This reduces the number of times that you need to update permissions in Office Project Web Access.

There are several elements that make up security for your environment. One of these elements is the permissions that control access to your Project workspace sites and the content in your sites. A new security model and new security features (such as SharePoint groups to control membership and item- and document-level permissions) make it easy to control who has access to what content in your sites. This chapter explains how security for sites and site content works, and it guides you through making choices about site security.

Another element integral to the security of your environment is how you structure security at the Web application level — choosing authentication methods and specifying the encryption methods to use. These topics are covered in this chapter.

Download this book

This topic is included in the following downloadable book for easier reading and printing:

See the full list of available books at Downloadable content for Project Server 2007.