Overview of security features in SharePoint Foundation 2010
Applies to: SharePoint Foundation 2010
Topic Last Modified: 2011-08-05
This article contains a brief overview of the new security features that are included in Microsoft SharePoint Foundation 2010. These include the following:
SharePoint Foundation 2010 support two modes of authentication: Claims-based and Classic mode.
Claims-based authentication is built on Windows Identity Foundation (WIF), which is a set of the .NET Framework classes that are used to implement claims-based identity.
For additional information about claims-based authentication, see Plan authentication methods (SharePoint Foundation 2010)
This mode of authentication uses Windows authentication and SharePoint Foundation 2010 treats all user accounts as Active Directory Domain Services (AD DS) accounts. Internet Information Services (IIS) provides three built-in forms of authentication: Integrated Windows authentication, Digest authentication, and Basic authentication.
For additional information about classic mode authentication, see Plan authentication methods (SharePoint Foundation 2010)
The automatic password change feature enables you to update and deploy passwords without having to perform manual password update tasks across multiple accounts, services, and Web applications. In earlier SharePoint versions, to change a farm password, you would have to locate each server in the farm and manually change the password. However in SharePoint Foundation 2010, a service account is mapped to a managed account from which all password updates are controlled.
Benefits of using a managed account are as follows:
Passwords of managed accounts can be updated from a single location and changes can be distributed to all servers in the farm that use that managed account.
Password changes can be scheduled to automatically occur, either according to a schedule, or based on the password expiry policy set in AD DS.
Managed accounts generate very long, cryptographically random passwords for all accounts.
|The generated password is at least 32 characters in length, with a mix of alphanumeric in both cases and special characters, and is created by using built-in core .NET Framework password generation routines.|
For additional information about automatic password change, see Plan automatic password change (SharePoint Foundation 2010) and Configure automatic password change (SharePoint Foundation 2010)
In previous SharePoint versions, administrators used the Permission Reporting tool in the SharePoint Administration Toolkit version 4.0 to determine the effective permission of a specific user and how the user gets the permission on a particular object. However, in SharePoint Foundation 2010, administrators can use the Check Permissions functionality to check effective permissions. It determines a user or group's permissions on all site collection resources. An administrator can also find a user's directly assigned permissions and the permissions assigned to any groups to which the user belongs. You can check permissions for a user or group on the Site Permissions page.
For additional information about site permissions, see Plan site permissions (SharePoint Foundation 2010)
For organizations that have migrated from Office SharePoint Server 2007 to SharePoint Foundation 2010 the following articles are available to help in the migration process:
In SharePoint Products 2010, the method to download security header information to a client's Web browser is restrictive. The default setting is Strict which will not allow certain file types to run (for example, Adobe Flash or Adobe Portable Document Format (PDF) files).
For additional information about browser file handling, see Configure settings for a Web application (SharePoint Foundation 2010) or Microsoft.SharePoint.Administration.SPWebApplication.BrowserFileHandling
Sandboxed solutions in SharePoint Products 2010 let code run in a restricted execution environment. For additional information about sandboxed solution, see Sandboxed solutions overview (SharePoint Foundation 2010)
This permission level is used to give groups access to a specific list, library, folder, document, or item, without giving them access to the whole site. For additional information about the limited access permission level, see Determine permission levels and groups (SharePoint Foundation 2010). For a graphical representation of the limited access permission level, download Best practices for using fine-grained permissions (white paper) (SharePoint Foundation 2010)
Built-in support controls who in an organization can use SharePoint Designer 2010 and how they can use it. For information about how to delegate access control in SharePoint Designer 2010, see Control where and how people use SharePoint Designer 2010 (http://go.microsoft.com/fwlink/p/?LinkId=224715) and Changes in SharePoint Designer 2010 (for IT pros)