Mobile security and authentication in SharePoint 2013
We are in the process of combining the SharePoint Server 2013 and SharePoint Server 2016 content into a single content set. We appreciate your patience while we reorganize things. See the Applies To tag at the top of each article to find out which version of SharePoint an article applies to.
Applies to: SharePoint Foundation 2013, SharePoint Server 2013
Topic Last Modified: 2017-06-02
Summary: Learn how to help secure a SharePoint mobile infrastructure, and learn about the different authentication types supported in SharePoint 2013.
This article provides security guidance and recommendations to help ensure that access to SharePoint Server 2013 and specific data in SharePoint is not compromised on a mobile device. This article also details the supported authentication types for select devices.
In this article:
This section provides security recommendations for using devices that are external to your corporate network. A lost or stolen device could be devastating to an organization on many levels. Therefore, necessary measures must be put in place if one were to be compromised.
General security considerations include the following:
-
Mobile devices can contain sensitive data or documents. Because mobile devices can be lost or stolen, we recommend that you set policies around mobile devices to help protect sensitive data and documents. This can include securing the mobile device by using a PIN or lock, and ensuring that you can remotely wipe the data on the mobile device. Available programs and features vary by mobile device. For more information about a possible method to implement these policies in your organization, see Exchange ActiveSync later in this article.
-
You can educate users about how they can help protect their user credentials. This can include signing out of sites when they have finished, not enabling any option that keeps them signed in or remembers their password, and frequently deleting cookies in the mobile browser. This can help prevent others from using their user credentials to log on to a SharePoint site if their mobile device is lost or stolen.
-
We recommend that you enable SSL to help secure communication between mobile browsers and the computer that is running SharePoint Server 2013. For more information about how to use a reverse proxy server, such as Forefront Unified Access Gateway (UAG), to help secure communication, see Forefront Unified Access Gateway (UAG) in the Forefront Technical Library.
Microsoft Exchange ActiveSync is a communications protocol that enables mobile access, over the air, to e-mail messages, scheduling data, contacts, and tasks. Exchange ActiveSync is available on Windows Phone and third-party phones and slates that are enabled for Exchange ActiveSync such as the Apple iPhone. One of the benefits of implementing Exchange ActiveSync in your organization is device-side security, and administration through policy enforcement. If SharePoint Server 2013 is deployed in an extranet topology, mobile devices access the computer that is running SharePoint Server 2013 via a public-facing URL. If the mobile device were to become lost or stolen, it is necessary to ensure that SharePoint data is not compromised. For example, by using Exchange ActiveSync you can wipe data contents from the device remotely, such as SharePoint configurations, or enforce a complex password at the lock screen to help prevent unauthorized access.
The following table lists a selection of Exchange ActiveSync features and policies that you can apply to some devices.
Table: Exchange ActiveSync policies for mobile devices
| Exchange ActiveSync policy | Description | ||
|---|---|---|---|
| Remote wipe (this is a feature and not an Exchange ActiveSync policy) | If a mobile phone is lost, stolen, or otherwise compromised, you can issue a remote wipe command from the Exchange Server computer or from any web browser by using Outlook Web App. This command restores the device to factory defaults.
| ||
| Enforce password on device (DevicePasswordEnabled) | This setting enables the mobile phone password. | ||
| Minimum password length (MinDevicePasswordLength) | This option specifies the length of the password for the mobile phone. The default length is 4 characters, but as many as 18 can be included. | ||
| Require alphanumeric password (AlphanumericDevicePasswordRequired) | This setting requires that a password contains numeric and non-numeric characters. | ||
| Allow simple password (AllowSimpleDevicePassword) | This setting enables or disables the ability to use a simple password such as 1234. | ||
| Maximum inactivity time lock (MaxInactivityTimeDeviceLock) | This option determines how long the mobile phone must be inactive before the user is prompted for a password to unlock the mobile phone. |
Important: |
|---|
| The selection of Exchange ActiveSync policies that can be used might differ on a device-by-device basis. For more information about which policies are supported on a specific device platform, such as Windows Phone and Apple iPhone, see Understanding Exchange ActiveSync Mailbox Policies. |
When a device is lost or stolen it may be useful to find the location of that device, and be able to wipe all data contents if it is necessary. There are various third-party services and solutions that can provide this functionality. An example is the Windows Phone Find My Phone service that can make it easier to recover your mobile device by locating it, or prevent someone from using it without your consent.
The functionality this service can provide includes the following:
-
Map your mobile device location.
-
Make your mobile device ring.
-
Lock your mobile device and show a message.
-
Wipe your mobile device data.
Note: |
|---|
| To learn more about the Find My Phone service for Windows Phone, see Find a lost phone. |
SharePoint Server 2013 supports multiple authentication methods and authentication modes. Not all mobile browsers and devices work with all the available authentication methods. When you plan for mobile device access, you must do the following:
-
Determine the mobile devices that you must support. Then, learn the authentication methods that are supported by the mobile devices. This information varies by manufacturer.
-
Determine the sites that you want to make available to your mobile device users.
-
Determine whether you want to make SharePoint sites available for mobile devices when the devices are used outside the corporate firewall. If you do, the method that you use to enable external access can also affect mobile device authentication.
The following tables detail the authentication types supported for browsers, OneDrive for Business, and the Office Hub Windows Phone experience in SharePoint Server 2013. For the below, OrgID refers to Microsoft Online Services ID, the identity provider for Office 365. Also, MSOFBA refers to Microsoft Office Forms Based Authentication.
Table: Mobile authentication support for SharePoint browsers
| SharePoint Infrastructure | Mobile Devices | |||||||
|---|---|---|---|---|---|---|---|---|
| Authentication Type | Authentication Protocol | ID Provider | SharePoint deployment | Windows Phone 7.5 (Internet Explorer Mobile) | Windows Phone 8 (Internet Explorer Mobile) | Windows 8 (Internet Explorer) | iOS 5.x or later versions (Safari Browser) | Android 4.x or later versions (Android Browser) |
| Windows Authentication | NTLM | Active Directory | On-premises | Yes | Yes | Yes | Yes | Yes |
| Basic Authentication | Active Directory | On-premises, extranet | Yes | Yes | Yes | Yes | Yes | |
| Forms-Based Authentication (FBA) | FBA | Active Directory, LDAP, SQL | On-premises, extranet | Yes | Yes | Yes | Yes | Yes |
| FBA | OrgID | SharePoint Online, hybrid -based scenarios | Yes | Yes | Yes | Yes | Yes | |
| SAML (Token-based) | SAML | WS-Federation 1.1 compatible Identity Provider | On-Premises, SharePoint Online, hybrid-based scenarios | Yes | Yes | Yes | Yes | Yes |
Table: Supported authentication types for the OneDrive for Business app
| Authentication type | Description | Supported | Administrator type required for configuration |
|---|---|---|---|
| Org-ID | Organizations with an Office 365 or SharePoint Online tenant without any federation. | Yes | Global admin |
| ADFS and Org-ID federation | Organizations with a hybrid Office 365 or SharePoint Online tenant with users federated from an on-premises directory. | Yes | Global admin plus the on-premises network administrator plus the SharePoint administrator |
| Windows authentication (NTLM) | Organizations with a SharePoint environment configured to allow NTLM claims-based Windows authentication. | Yes | SharePoint administrator |
| Forms-based authentication (FBA) | Organizations with a SharePoint environment configured to allow Forms-based authentication or other compatible claims-based authentication via a standard web control. | Yes | SharePoint administrator |
| Qualified non-ADFS identity providers | Organizations with an Office 365 or SharePoint Online environment configured to allow user sign-in that is federated with an identity provider qualified for rich clients in the Works with Office 365 - Identity program. | Yes | SharePoint administrator plus the on-premises Network administrator or Global admin (in some organizations the Global admin is a requirement, not an option.) |
| All other non-ADFS identity providers | Organizations with a SharePoint environment configured to allow a non-ADFS identity provider. | No | SharePoint administrator plus the on-premises network administrator |
| Kerberos authentication | Organizations with a SharePoint environment configured to support Kerberos authentication. | No | SharePoint administrator plus the on-premises network administrator |
| Basic authentication | Organizations with a SharePoint environment configured to support Basic authentication. | No | SharePoint administrator plus the on-premises network administrator |
Note: |
|---|
| If you’re an Office 365 multi-tenant user you can connect from the OneDrive for Business app in any network environment including Wi-Fi and cellular data. If you’re not using multi-tenant Office 365, you can connect only when using your organization’s on-site Wi-Fi network. Contact your SharePoint administrator if you’re unsure which user you are. |
Table: Mobile authentication support matrix for Office Hub
| SharePoint Infrastructure | Client side | Mobile devices | ||||
|---|---|---|---|---|---|---|
| Authentication Type | Authentication Protocol | ID Provider | SharePoint deployment | Handled through: | Windows Phone 7.5 (Internet Explorer Mobile) | Windows Phone 8 (Internet Explorer Mobile) |
| Windows Authentication | NTLM | Active Directory | On-premises | NTLM | Yes | Yes |
| Basic Authentication | Active Directory | On-premises, extranet | Basic Authentication | No | Yes (https) | |
| Forms-Based Authentication (FBA) | FBA | Active Directory, LDAP, SQL | On-premises, extranet | MSOFBA | Yes | Yes |
| FBA | OrgID | SharePoint Online, hybrid -based scenarios | MSOFBA | Yes | Yes | |
| FBA | OrgID | SharePoint Online, hybrid -based scenarios | Active Authentication(IDCRL) | No | Yes | |
| SAML (token-based) | SAML | WS-Federation 1.1 compatible Identity Provider | On-premises, SharePoint Online, hybrid -based scenarios | MSOFBA | Yes | Yes |
| SAML | WS-Federation 1.1 compatible Identity Provider | On-premises, SharePoint Online, hybrid -based scenarios | Active Authentication(IDCRL) | No | Yes |
Note: |
|---|
| In order for mobile devices to communicate with SharePoint servers, Internet Protocol Security (IPSec) must be disabled on the servers. The reason this must be done is that mobile devices are not domain-joined. |

Important: