Đang chuẩn bị liên kết để tải về tài liệu:
Designing a Microsoft SharePoint 2010 Infrastructure Vol 1 part 33

Không đóng trình duyệt đến khi xuất hiện nút TẢI XUỐNG

Designing a Microsoft SharePoint 2010 Infrastructure Vol 1 part 33. This course is intended for IT Professionals who use Microsoft SharePoint 2010 in a team-based, medium-sized to large environment. While they may have implemented a SharePoint deployment, they have limited experience in designing a SharePoint infrastructure. They likely work as a senior administrator who acts as a technical lead over a team of administrators. Members of this audience should have at least 6 months experience with SharePoint 2010. | Planning Authentication 6-23 Authentication Topologies for Multiple Farms Key Points The topology for claims-based authentication in a multiple farm infrastructure consists of a local STS which is local to the SharePoint farm and a partner STS which is in a separate SharePoint farm. There is a trust relationship between the SharePoint farms. The authentication process is as follows 1. An external user whose credentials are not directly accessible by the local STS requests authentication. 2. The Web application responds to the authentication request with a redirect to the partner STS. 3. The authentication request is submitted to the partner STS. 4. The partner STS creates an IP-STS token for the user and submits it to the local STS. 5. The local STS decrypts the IP-STS token creates a Relying Partner STS RP-STS token and returns it to the external user. MCT USE ONLY. STUDENT USE PROHIBITED 6-24 Designing a Microsoft SharePoint 2010 Infrastructure 6. The RP-STS token is then submitted to the Web application. 7. The Web application authenticates the user. In this example the Web application returns a cookie to the user. MCT USE ONLY. STUDENT USE PROHIBITED Planning Authentication 6-25 Lesson 3 Selecting Authentication Methods Matching Authentication Methods to Business Requirements Demonstration Selecting Classic Mode or Claims-Based Authentication Evaluating Authentication Methods Multi-Mode Authentication Planning Authentication for Farm Zones Planning Authentication Testing An effective authentication plan incorporates the appropriate authentication methods for each Web application in your SharePoint 2010 architecture. To produce an authentication plan you must be able to match authentication methods to business requirements. You must evaluate authentication methods and understand how to implement different forms of authentication. Objectives After completing this lesson you will be able to Explain how to match authentication methods to business requirements. .

Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.