seaspc 2011 - collaborating with extranet partners on sharepoint 2010

46
Platinum Sponsor Gold Sponsors

Upload: michael-noel

Post on 17-May-2015

1.287 views

Category:

Technology


2 download

DESCRIPTION

Organizations planning for Extranet access to SharePoint 2010 or faced with providing access to an Intranet from multiple internal authentication platforms often find it challenging to properly architect SharePoint for extranets, to isolate content, and to manage identities across disparate systems. The complexity involved in understanding how to isolate content from a security perspective but still provide for a collaborative space for end users is complex, and if not done correctly can lead to security breaches and confusion. This session focuses on understanding the various extranet models for SharePoint 2010 and providing real world guidance on how to implement them. Covered are extranet content models and extranet authentication options, including Claims-based authentication and also covering advanced options using tools such as Microsoft's Forefront Identity Manager (FIM) 2010 to centralize identity management to SharePoint 2010 farms, allowing for better control, automatic account provisioning, and synchronization of profile information across multiple SharePoint authentication providers. • Review Extranet design options with SharePoint 2010 • Understand the need for identity management across SharePoint farms • Examine real world deployment guidance and architecture for SharePoint environments using multiple authentication providers

TRANSCRIPT

Page 1: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

Platinum Sponsor

Gold Sponsors

Page 2: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

PLANNING EXTRANETS WITH SHAREPOINT 2010

Michael Noel

Page 3: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

MICHAEL NOEL

• Author of SAMS Publishing titles “SharePoint 2007 Unleashed,” the upcoming “SharePoint 2010 Unleashed,” “SharePoint 2003 Unleashed”, “Teach Yourself SharePoint 2003 in 10 Minutes,” “Windows Server 2008 R2 Unleashed,” “Exchange Server 2010 Unleashed”, “ISA Server 2006 Unleashed”, and many other titles .

• Partner at Convergent Computing (www.cco.com / +1(510)444-5700) – San Francisco, U.S.A. based Infrastructure/Security specialists for SharePoint, AD, Exchange, Security

Page 4: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

WHAT WE’LL COVER• Why an Extranet?

• SharePoint 2010 Extranets

• Extranet Architecture Options

• Claims-based Authentication

• Forefront Unified Access Gateway (UAG) for extranets

• Forefront Identity Manager for Identity Management in an Extranet

Page 5: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

WHY AN EXTRANET?

Page 6: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

WHY AN EXTRANET?

• Security Isolation• Isolation of Data

• Less Exposure, Perimeter Network Scenarios

• Partner Collaboration• Share SP Content with External Partners

• Control Partner Accounts

Anonymous Customer Scenarios are not really Extranets

Page 7: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

SHAREPOINT 2010 EXTRANETS

• Claims-based Authentication Support

• Multiple Authentication Providers

• Better Scalability (Services Architecture)• Goodbye SSP!

• Server Groups

• Services Applications

• Multiple Authentication Types per Web Application

Page 8: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

SAMPLE EXTRANET ARCHITECTURE

Page 9: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

DESIGN AROUND SECURITY REQUIREMENTS

• Scenario 1: Extranet and Internal Users in Single Farm

• 1A: Single Web App / Single Site Collection

• 1B: Single Web App / Separate Site Collections

• 1C: Multiple Web Apps / Content DBs

• 1D: Separate App Pool / Service App Group

• Scenario 2: Extranet and Internal Users in Single Farm / Separate Trusted Forests

• Scenario 3: Extranet and Internal Users in Multiple Farms / One-Way Trust

• Scenario 4: Extranet an Internal Users in Separate Farms / Claims-based Auth for Internal Access to Extranet

• Scenario 5: Extranet an Internal Users in Separate Farms / No Access for Internal Accounts to Extranet

• Scenario 6: Separate Farms / AD FS Federation for Extranet Auth

LessSecure

MoreSecure

Page 10: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

EXTRANET SCENARIO 1:EXTRANET AND INTERNAL USERS IN SINGLE FARM

1A: Single Web App / Single Site Collection1B: Single Web App / Separate Site Collections1C: Multiple Web Apps / Content DBs1D: Separate App Pool / Service App Group

Page 11: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

EXTRANET SCENARIO 2:EXTRANET AND INTERNAL USERS IN SINGLE FARM / SEPARATE TRUSTED FORESTS

Page 12: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

EXTRANET SCENARIO 3:EXTRANET AND INTERNAL USERS IN MULTIPLE FARMS AND PERIMETER NETWORK / ONE-WAY TRUST

Page 13: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

EXTRANET SCENARIO 4:EXTRANET AN INTERNAL USERS IN SEPARATE FARMS / CLAIMS-BASED AUTH PROVIDER FOR INTERNAL AUTH TO EXTRANET

Page 14: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

EXTRANET SCENARIO 5:EXTRANET AN INTERNAL USERS IN SEPARATE FARMS / NO ACCESS FOR INTERNAL ACCOUNTS TO EXTRANET

Page 15: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

EXTRANET SCENARIO 6:SEPARATE FARMS / AD FS FEDERATION FOR EXTRANET AUTH

Page 16: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

EXTRANET NOTES

Page 17: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

ONE-WAY TRUST SCENARIOS

• People Picker needs to be configured to crawl domain if it doesn’t trust the domain where the SharePoint farm is installed.

• Only with STSADM (Rare exception when you can’t use PowerShell)

• Example Syntax:

• stsadm.exe -o setapppassword -password AnyPassw0rd

• stsadm.exe -o setproperty -pn peoplepicker-searchadforests -pv "domain:companyabc.com,COMPANYABC\svc_sppplpick,Password1;domain:extranetabc.com" -url https://extranet.companyabc.com

• stsadm.exe -o setproperty -pn peoplepicker-searchadforests -pv "domain:companyabc.com,COMPANYABC\svc_sppplpick,Password1;domain:extranetabc.com" -url https://spcaext.companyabc.com

• Syntax is critical

• Run against all web apps

Page 18: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

DESIGN FOR CLIENTLESS ACCESS TO SHAREPOINT

• Services Applications for Extranet Clients:• Word Services

• Excel Services

• Visio Services

• Access Services

• InfoPath Forms Services

• Allows ‘Clientless’ access to SharePoint content, for Extranet partners without Office

Page 19: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

STANDARD REQUIREMENTS APPLY TO EXTRANETS AS WELL

• SharePoint-aware Antivirus• i.e. Forefront Protection for SharePoint

• SharePoint-aware Backup and Restore• i.e. System Center Data Protection Manager (DPM) 2010

• Rights Management?• Active Directory Rights Management Services (AD RMS)

Page 20: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

CONTENT DEPLOYMENT WITH EXTRANETS

Page 21: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

CLAIMS-BASED AUTHENTICATION

Page 22: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

CLAIMS-BASED AUTH

• SharePoint doesn’t actually Authenticate Users, it relies on IIS or other providers

• SharePoint 2010 Allows for Classic and Claims-based Auth Scenarios

• Classic Authentication is similar to SharePoint 2007

• Claims based Auth adds the following key benefits:• Allows for Multiple Authentication Types per Web Application Zone

• Removes SharePoint from the Authentication Provider

• Allows for federation between organizations (AD FS, etc.) scenarios

• Does not require Kerberos Delegation

• Remember the difference between Authentication and Authorization…

Page 23: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

CLASSIC VS. CLAIMS-BASED AUTHType Classic-mode

authentication Claims-based authentication

WindowsNTLMKerberosAnonymousBasicDigest

Yes Yes

Forms-based authenticationLDAPSQL database or other databaseCustom or third-party membership and role providers

No Yes

SAML token-based authenticationAD FS 2.0Third-party identity providerLDAP

No Yes

Page 24: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

MIXED-MODE VS. MULTI-AUTHENTICATION

Page 25: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

EXAMPLE: PARTNER ENVIRONMENT WITH MULTIPLE AUTH TYPES ON SINGLE W.A.

Page 26: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

FOREFRONT UNIFIED ACCESS GATEWAY 2010

Page 27: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

UAG ARCHITECTURE

DirectAccess

HTTPS (443)

Layer3 VPN

Data Center / Corporate Network

Business Partners /Sub-Contractors

AD, ADFS, RADIUS, LDAP….

Home / Friend / Kiosk

Employees Managed Machines

Mobile

Exchange

CRM

SharePoint

IIS based

IBM, SAP, Oracle

Terminal / Remote Desktop Services

Non web

HTTPS /

HTTP

NPS, ILM

Internet

Page 28: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
Page 29: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

WHAT ABOUT TMG? (NEW ISA)

Capability TMG 2010 UAG 2010

Publish Web applications using HTTPS X XPublish internal mobile applications to roaming mobile devices X X

Layer 3 firewall X X*Outbound scenarios support X X*Array support X Globalization and administration console localization X

Wizards and predefined settings to publish SharePoint sites and Exchange X X

Wizards and predefined settings to publish various applications X

Active Directory Federation Services (ADFS) support X

Rich authentication (for example, one-time password, forms-based, smart card) X X

Application protection (Web application firewall) Basic Full

Endpoint health detection XInformation leakage prevention XGranular access policy XUnified Portal X

Page 30: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

WHAT IS FOREFRONT IDENTITY MANAGER?

Page 31: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

IDENTITY AND ACCESS MANAGEMENT

Identity and Access Management

Secure Messaging Secure EndpointSecure Collaboration

Active Directory® Federation Services

Information Protection

Page 32: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

WHY FIM FOR SHAREPOINT?

Page 33: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

MANAGE SHAREPOINT IDENTITIES

• Create Multiple Authentication Providers for SharePoint Farms• AD DS Forests (Extranet forests)

• AD LDS Authentication Providers

• SQL Table (FBA) Authentication Sources

• LDAP Providers

• Etc…

• Keep those Authentication Providers Managed

Page 34: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

ActiveDirectory

Extranet Forest

Test Forest

FBA Table

LOB App

HR SystemFIM

Workflow

Manager

• Policy-based identity lifecycle management system

• Built-in workflow for identity management

• Automatically synchronize all user information to different directories across the enterprise

• Automates the process of on-boarding users

User Enrollment

Approval

User provisioned on all allowed systems

IDENTITY MANAGEMENTUSER PROVISIONING FOR SHAREPOINT AND OTHER APPLICATIONS

VPN

Page 35: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

HR SystemFIM

Workflow

• Automated user de-provisioning

• Built-in workflow for identity management

• Real-time de-provisioning from all systems to prevent unauthorized access and information leakage

User de-provisioned

User de-provisioned or disabled on all systems

IDENTITY MANAGEMENTUSER DE-PROVISIONING

ActiveDirectory

Extranet Forest

TestForest

FBATable

LOBApp

VPN

Page 36: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

HRSystem FIM

LDAP

ExtranetAD

InternalAD

givenNamesntitlemailemployeeIDtelephone

SammyDearling

008

givenNamesntitlemailemployeeIDtelephone

givenNamesntitlemailemployeeIDtelephone

SamaraDarling

007

givenNamesntitlemailemployeeIDtelephone

SamDearingIntern

007

givenNamesntitlemailemployeeIDtelephone

555-0129

SamanthaDearing

007

Coordinator

[email protected]

555-0129

SamanthaDearing

Coordinator

007

IdentityData

Aggregation

GivenNamesntitlemailemployeeIDtelephone

[email protected]

SamanthaDearing

007

Coordinator

555-0129

IDENTITY SYNCHRONIZATION AND CONSISTENCYIDENTITY SYNCHRONIZATION ACROSS MULTIPLE DIRECTORIES

Attribute Ownership

FirstNameLastName

EmployeeID

Title

E-Mail

Telephone

Page 37: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

Attribute Ownership

FirstNameLastName

EmployeeID

Title

E-Mail

Telephone

FIMHRSystem

LDAP

ExtranetAD

InternalAD

IdentityData

Brokering(Convergence)

givenNamesntitlemailemployeeIDtelephone

SammyDearling

007

givenNamesntitlemailemployeeIDtelephone

givenNamesntitlemailemployeeIDtelephone

SamaraDarling

007

givenNamesntitlemailemployeeIDtelephone

SamDearingIntern

007

givenNamesntitlemailemployeeIDtelephone 555-0129

BobDearing

007

Coordinator

555-0129

SamanthaDearing

Coordinator

[email protected]

007

[email protected]

[email protected]

555-0129

[email protected]

555-0129

SamanthaDearing

[email protected]

Samantha

Coordinator

555-0129

IDENTITY SYNCHRONIZATION AND CONSISTENCYIDENTITY CONSISTENCY ACROSS MULTIPLE DIRECTORIES

Page 38: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

CUSTOMIZABLE IDENTITY PORTAL

How you extend it

SharePoint-based Identity Portal for Management and Self Service

Add your own portal pages or web partsBuild new custom solutionsExpose new attributes to manage by extending FIM schemaChoose SharePoint theme to customize look and feel

Page 39: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

CUSTOMIZABLE IDENTITY PORTAL

• Can be used to allow Extranet Partners to Perform Self-Service Management• Give control of Account Management to users/administrators of

the extranet partner

• Secure access to portal through VPN/Reverse Proxy

• Portal in the DMZ

• Can be used for Self-Service Password Reset (via domain-joined computer)

Page 40: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

• Streamline deployment by enrolling user and computer certificates without user intervention

• Simplify certificate and SmartCard management using Forefront Identity Manager (FIM)

• Can be used to automate Certificate management for dual factor auth approaches to SharePoint logins

STRONG AUTHENTICATION—CERTIFICATE AUTHORITY

HR System

Active Directory Certificate Services (AD

CS)

FIM CM

FIM

User Enrollment and Authentication request sent by HR System

FIM policy triggers request for FIM CM to issue certificate or SmartCard

User is validated using multi-factor authentication

FIM Certificate Management (CM) requests certificate creation from AD CS

Certificate is issued to user and written to either machine or smart card

End User

SmartCard

User ID andPassword

SmartCard

End User

Page 41: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

REAL WORLD FIM USAGE SCENARIOS

Page 42: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

FIM FOR EXTRANET FOREST MGMT

• Internal AD DS Forest

• DMZ Extranet AD DS Forest

• FIM Auto-provisions certain user accounts in Extranet forest and keeps Passwords in Sync to allow Internal users to access/collaborate with Partners

• FIM allows Self-Service Portal Access for Extranet user accounts in the partner forest

• Two-factor Auth scenarios, to automate provisioning of user accounts AND certificates to systems

Page 43: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

FIM FOR ROLE BASED ACCESS CONTROL• FIM is central to RBAC Strategy

• Can auto-add users to Groups based on RBAC Criteria

• HR Defines a user’s access based on their role

• FIM auto-adds that user to specific Role Groups in AD DS, which are tied to SharePoint Groups that have the rights that that role group requires.

User1

User2

Role Group

SharePoint Group

Page 44: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

SESSION SUMMARY

• Understand the Extranet Design Options for 2010

• Keep Extranet Accounts out of local AD

• Determine how Identities will be Managed

• Use FIM for Identity Management, Self-Service, and Provisioning/Deprovisioning of Extranet Accounts

• Use UAG to secure inbound access to extranets/intranets

Page 45: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

Thank you to our Sponsors

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Page 46: SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010

THANKS FOR ATTENDING!QUESTIONS?

Michael Noel

Twitter: @MichaelTNoel

www.cco.com

Slides: slideshare.net/michaeltnoel