190 likes | 255 Views
Building Customer/Partner Extranets Designing a Secure Extranet with Sharepoint 2007 Russ Basiura RJB Technical Consulting www.rjbtech.com russ@rjbtech.com. Agenda. What is an extranet??. Extranets pose unique challenges for SharePoint administrators. What is the purpose of FBA?.
E N D
Building Customer/Partner ExtranetsDesigning a Secure Extranet with Sharepoint 2007Russ BasiuraRJB Technical Consultingwww.rjbtech.comruss@rjbtech.com
Extranets pose unique challenges for SharePoint administrators
What are the issues and limitations with the out-of-the-box features?
Scenario • Active Directory in the DMZ • No Trusts • Single Server or small farm • All servers in the DMZ • All Services in the DMZ • Mail • IM • Basic Authentication over HTTPS • Digest Authentication (Not Supported)
Scenario • All Users must logon • Management via Remote Desktop • All content stored in portal • Ports • TCP 3389 open to intranet for RDP • TCP 80 open to intranet for HTTP • TCP 443 open to extranet for HTTPS
User Challenges • Authentication • Users don’t like being asked for identity • Use SSO to access other resources • URLS • Store content on the portal • Put content links on the portal
Technical Challenges • Authentication • SSL • Account Creation and Maintentance • Site Creation Process
Common Challenges • Where should I locate my servers? • How is my firewall affected? • What other solutions should be considered? • Authentication Security • High Availability • How does this effect my SharePoint architecture? • Do I really need another SharePoint Farm?
Authentication • Basic over https • Integrated • NTLM • Kerberos • Digest • Single web server or web farm with affinity • Not Supported • Custom • ISAPI Filter with persistent cookie • Not Supported
Custom Authentication • Must create a valid Windows Principal • Must attach context to thread before entering .Net pipeline • Ows.dll is an ISAPI extension • ISAPI extensions cannot be chained • Build an ISAPI filter • Create and manage Windows Principal • Embed basic authentication headers in request
Service Level Agreements End User training Information lifecycle controls Communicating with external users Acceptable Use Policies Extranet Governance