SharePoint Extranet Security Secure Deployment of

SharePoint Extranet Security
Secure Deployment of SharePoint
Extranet for Enterprises
A MUST-READ WHITE PAPER ON SHAREPOINT EXTRANET SECURITY , ADDRESSING
ISSUES THAT NEED TO BE CONSIDERED WHEN DEPLOYING A SHAREPOINT EXTRANET
White Paper
Copyright © 2012 NextLabs, Inc. All rights reserved.
The information in this document is subject to change without notice. NextLabs welcomes comments or
suggestions regarding this manual or any of our product documentation. Please send an e-mail to
info@nextlabs.com.
TRADEMARKS
NextLabs®, ACPL®, Enterprise DLP™, and the Enterprise DLP logo are registered trademarks of NextLabs, Inc.
All other brands or product names used herein are trademarks or registered trademarks of their respective
owners.
Published in San Mateo, CA, by NextLabs, Inc.
www.NextLabs.com
info@nextlabs.com
650.577.9101
2 Wat er s Par k Dr ive, Su it e 250  San Mat eo , CA  94403 USA  t :650-577-9101  f :650-577-9102
 w w w .Next Lab s.co m
© 2006-2012 NextLabs, Inc. All Rights reserved. NextLabs, Enterprise DLP, ACPL, Compliant Enterprise,
and their corresponding logo are trademarks or registered trademarks of NextLabs, Inc. in the United States.
All other trademarks or registered trademarks are the property of their respective owners. 09 -03
2 Wat er s Par k Dr ive, Su it e 250  San Mat eo , CA  94403 USA  t :650-577-9101  f :650-577-9102
 w w w .Next Lab s.co m
Secure Deployment of SharePoint Extranet for Enterprises
Enterprises use extranets for external collaboration with partners, suppliers, customers, clients, jointventures and remote employees. Enterprises collaborating with external users may have different types
of content that needs to be shared with different types of external users, requiring various types of
permissions and access control methods. With many variations in content, access control, permissions,
processes and such, enterprises concerned about security risks and compliance violations should
carefully and methodically plan extranet deployment.
Making more information and processes available to external users can enhance efficiency, increase
productivity, and create customer loyalty. At the same time, however, extranets can increase business
risk for those enterprises that need to be meet security requirements such as customer IP protection,
company confidential IP protection, company sensitive data protection, and compliance for obligatory
regulations such as ITAR, HIPAA, NERC, FERC, PIPAA and many more. To avoid security risks and
multi-million dollar fines, these business requirements should drive the pertinent techniques and
processes needed for secure extranet deployment. To meet these requirements, SharePoint architects
need to consider the following five important security areas with respect to business requirements:
 Web Application Architecture - means by
which an external user will access the
extranet content hosted by enterprises
(www.sharepoint.extranet.company.com).
 Authentication –process of verifying a
user’s identity.
 User Management –process used to
manage the external users.
 Authorization –process of defining
permissions, rules and rights for
authenticated users.
 Content Management – a set of processes
that manage content creation, content
placement on the extranet, content
classification, and workflows for
updating/approving content.
Web Application Architecture
Before a site or a site collection is created to collaborate with external users, a web application must be
created. A web application (http://sharepoint.extranet.company.com) is how an external user will
access the extranet. It is comprised of an Internet Information Services (IIS) site with a unique
application pool. When you create a new web application, you also create a new database and define
the authentication methods used to connect to the database. For SharePoint extranet deployments, you
can either use different web applications for internal and external employees or use the same web
application for everyone.
Using different web applications for internal and external users is
prevalent when enterprises use the extranet to share information with external users. Using the same
web application for both external and internal users is not as popular, but is preferred when enterprises
want internal and external users to use a single common application to work jointly to produce content.
Authentication
Authentication is the process of validating a user's identity and is managed by Internet Information
Services (IIS). The three main types of authentication methods that can be deployed for extranet are:
2 Wat er s Par k Dr ive, Su it e 250  San Mat eo , CA  94403 USA  t :650-577-9101  f :650-577-9102
 w w w .Next Lab s.co m