Deploying a SharePoint Extranet

By Alan Marshall
Twitter: pomealan
Linkedin:http://nz.linkedin.com/pub/alan-
marshall/3/980/267


Acknowledgements: Chandan Banerjee and Wayne
Ewington (Microsoft)
Session Agenda
—   Extranet Definition
—   Implementation Scenarios
—   Design Considerations and Challenges
—   Deployment topologies
—   Which SharePoint version and licenses
—   Hints and Tips
—   Wrap up
What is an Extranet
ex-tra-net [ek-struh-net]

— Noun
An intranet that is partially accessile to authorized persons
outside of a company or organisation.

A network (as of a company) similar to an intranet that also
allows access by certain others (such as customer or
suppliers)
Implementation Scenarios



                  Share secure      Collaborate with    Personalised
 Remote Access
                   information          Partners       Customer Portal
•Employees       •Provide reports   •Design a          •View loyalty
 working          to suppliers       solution           card
 remotely        •Display order     •Request            transactions
•Teleworkers      tracking           support           •Reward
                 •Student Portal                        schemes
                                                       •Specialised
                                                        content
Design Considerations and
Challenges
— Authentication
    — Single Sign-on
    — Managing accounts
— Security
    —   Sensitivity of data
    —   Protect against resources being compromised
    —   SharePoint Platform
    —   How much do you trust external users
— Platform deployment requirements
— Features required
    — Which version of SharePoint? Foundation, Server, Enterprise
    — Integration
— License Costs
— Network infrastructure
Implementation Options
— Option 1 – Provide access to internal SharePoint Server
    — Remote Employees
    — Partners
— Option 2 – Publish content to an external environment
  (read only)
    — Share secure information
    — Remote Employees
    — Partners
— Option 3 – Provide an Extranet Farm dual authenticated
    — Share secure information
    — Partners
    — Customer Portal
— Option 4 – Host in the cloud
    — Partners
    — Customer Portal
Option 1 – Perimeter Proxy


       Internet                         DMZ                            Internal Network
                                                                                              • Threat Management Gateway
                                                                                                (TMG) – acts as a reverse proxy
                                                                           SharePoint Farm
                                                                                                translating external encrypted
                                                                                                traffic to internal SharePoint server.
            HTTPS               HTTPS            HTTP                                         • Firewall ports required for 443
                    Perimeter
                                                                                                externally and 80 internal LAN
 Remote
Employees            Firewall
                                         TMG
                                        Server
                                                        LAN Firewall                            firewall.
                                                                                              • Authentication occurs on
                                                                             Authentication
                                                                                                SharePoint Web Front ends with
                                                                                                internal AD


Unknown User Device
• Virus Scanner
• Private Browsing                                                          Unauthenticated traffic
What’s TMG
— Threat Management Gateway
    — Formally ISA Server
— Forefront TMG server features
    —   URL filtering
    —   antimalware inspection
    —   intrusion prevention
    —   application- and network-layer firewall
    —   HTTP/HTTPS inspection in a single solution
    —   Reverse Proxy HTTP – HTTPS
    —   Authentication – including 2 phase
Option 1a – Perimeter Proxy with
   RODC
       Internet                             DMZ                                 Internal Network
                                                                                                      • TMG – performs authentication and
                                                                                                        acts as a reverse proxy translating
                                            TMG
                                           Server                                   SharePoint Farm
                                                                                                        external encrypted traffic to
                                                                                                        internal SharePoint server.
            HTTPS               HTTPS                     HTTP                                        • Firewall ports required for 443
                    Perimeter
                                                                                                        externally and 80 internal LAN
 Remote
Employees            Firewall                                    LAN Firewall                           firewall, plus ports for IPSec
                                        Authentication                                                • Authentication occurs on the TMG
                                                                                                        Server with the Read Only Domain
                                                                   Secure                               Controller (RODC).
                                                                  Account
                                                                 Replication

                                           RODC                                          Active
                                           Server                                       Directory


Unknown User Device
• Virus Scanner                                          Accounts replicated to DMZ
• Private Browsing                                       • Subset of attributes
                                                         • Admin accounts excluded
                                                         • No updates permitted
                                                         • Windows 2008 feature
What’s an RODC
—   Read Only Domain Controller
—   Windows Server 2008
—   Removes the need for a trust between domains
—   Limit replication accounts and attributes
Option 1b – Perimeter Proxy with
   RODC and UAG
       Internet                             DMZ                                 Internal Network
                                                                                                      • Unified Access Gateway (UAG)
                                                                                                        replaces TMG – performs
                                            UAG
                                           Server                                   SharePoint Farm
                                                                                                        authentication, user privilege
                                                                                                        throttling, acts as a reverse proxy
            HTTPS               HTTPS                     HTTP                                          translating external encrypted
                    Perimeter
                                                                                                        traffic to internal SharePoint server.
 Remote
Employees            Firewall                                    LAN Firewall                         • Firewall ports required for 443
                                        Authentication                                                  externally and 80 internal LAN
                                                                                                        firewall, plus ports for IPSec
                                                                   Secure                             • Authentication occurs on the UAG
                                                                  Account                               Server with the Read Only Domain
                                                                 Replication
                                                                                                        Controller (RODC)
                                           RODC
                                           Server




                                                         Accounts replicated to DMZ
                                                         • Subset of attributes
                                                         • Admin accounts excluded
                                                         • No updates permitted
UAG
— Unified Access Gateway
    — Spin-off of ISA Server
— Remote Access to SharePoint and/or Exchange.
    — granular application filtering capabilities
    — deep endpoint health detection
    — wizard driven configuration
— Comprehensive Remote Access (SSL VPN)
— DirectAccess
Option 2 – Publish content

       Internet                              DMZ                                 Internal Network
                                                                                                               • Threat Management Gateway
                                                                                                                 (TMG) – Authentication, Reverse
                                                                                         SharePoint Farm         Proxy.
            HTTPS           HTTPS                                                 Content
                                                                                 Deployment
                                                                                                               • Firewall ports required for central
                                                                                                                 admin port outbound and
External            Perimeter
                     Firewall        TMG
                                                          HTTPS
                                                                  LAN Firewall                                   externally 443.
 People
                                    Server                                                                     • All or part of intranet is content
                                                                                              Authentication     deployed to the DMZ server
                                             SharePoint
                                              Server(s)

                                                       IntegrationActive
                                                                     options
                                      SQL Server
                                                       • Limited integration with back-
                                                                 Directory
                                                  DMZ AD
                                                          end systems
                                New SharePoint Farm
                                • Same version as internal
                                • Separate domain and SQL
                                                 Separate domain
                                                 • No single sign on for internal
                                                    users
Option 3 - Extranet Farm dual
  authenticated
       Internet                               DMZ                                   Internal Network

                                                                                           Internal
                                                                                                           • Unified Access Gateway (UAG) –
                                      UAG
                                     Server
                                                                                            Users            Authentication. Note TMG does not
                                                                     LAN Firewall
                                                                                                             support Forms hand off.
            HTTPS           HTTPS                 HTTP                                                     • Firewall ports required for IPSec
                                                                                                             AD replication
External            Perimeter
                     Firewall
                                                                                                           • All content accessed by internal
 People
                                                                                                             and external users is hosted in
                          Authenticate
                          LDAP External
                                                                                           SQL Server        DMZ
                             Users
                                                         Internal Users
                                                                                                           • Data layer (SQL) is separated into
                                                           Separate SharePoint
                                                          Authenticate
                                                                   Replicate
                                                                                                        farm another network layer
                                              SharePoint   • No content sharing Shared SQL Environment
                                                                   Accounts
                                                                              Active   (use
                                               Server(s)
                            Extranet AD or
                                 LDS
                                                              workflow or third party)Authentication for Server
                                                                             Directory
                                                                                       SQL
                                                           • Consideration to IAnot supported
                                                                                        for
                                                            DMZ AD


                                                              useability

                                              SharePoint 2010 configured
                                              CLAIMS authentication
Option 3a - Extranet Farm dual
  authenticated with ADFS
       Internet
        Corp A                                    DMZ                                      Internal Network

                                                                                                      Internal
                                          UAG
                                         Server
                                                                                                       Users       • Unified Access Gateway (UAG) – All
                                                                            LAN Firewall
                                                                                                                     access and authentication.
             HTTPS           HTTPS                       HTTPS                                                     • Firewall ports required for IPSec
                                                                                                                     AD replication and ADFS port 443
External             Perimeter
                      Firewall
                                                                                                                   • All content accessed by internal
 People
                                                                                                                     and external users is hosted in
                              All user
                                                                                                      SQL Server     DMZ
                           Authentication                      SharePoint                                          • Data layer (SQL) is separated into
                                                                 Service
                                                                Accounts
                                                                                                                     another network layer
                                                                                     Replicate
                                                                                     Accounts
                                                                                                                   • ADFS server hands off
                                                  SharePoint
  ADFS 2.0                                         Server(s)
                                                                                                       Active        authentication to internal AD or
                                   ADFS 2.0                                                           Directory
   Server
                                 Proxy Server                                                                        partner AD
                                                                   DMZ AD

                                                                                           ADFS 2.0
                                                                                            Server
                                                   Authentication hand off
Option 4 – use the cloud

                                                                  — All content
       Internet                               Internal Network
                                                                    stored in
                                                                    SharePoint cloud
                                                                    service
            HTTPS


 Remote                           Perimeter           Internal
                                                                  — Internal users
Employees                          Firewall            Users
                                                                    authenticated
                                                                    against
                                                                    replicated AD
                      Secure
                     Account
                    Replication
                                                    Internal AD
                                                                  — External users
                                                                    use Windows
                                                                    Live ID
                          Content Sharing
                          - Use workflow or third party tool
                          - Content deployment not supported
Which SharePoint version
                 Applicable to         Deployment          Licences
                                       option
SharePoint       Collaboration         Option 3 - 4        Windows
Foundation (or   Solutions                                 External
Search server                                              Connector SQL
express)                                                   CPU
SharePoint       Portals with WCM,     Option 3 – 4        SharePoint Std
Server 2010      Profiles,             Option 1 for read   CAL
Std              Intranet publishing   only                SQL CPU or
                                                           CAL

SharePoint       Same as Std+          Option 3            SharePoint
Server 2010      form services, BI                         Std+Ent CAL
Ent              and FAST                                  SQL CPU or
                                                           CAL

SharePoint       Anonymous or      Option 3 - 4            SharePoint FIS
Server 2010      unknown user base                         SQL CPU
FIS
Component Parts
—   DMZ
—   Unified Access Gateway
—   Threat Management Gateway
—   SharePoint Foundation
—   SharePoint Server
     — Standard
     — Enterprise
—   Active Directory
—   Active Directory Lightweight Directory Services
—   Active Directory Federated Services
—   SQL Server
—   IPSec
Hints and Tips
— When using an RODC with SharePoint member server
  direct access to RWDC required to:
    — Try to find a user who is not currently existing in a SharePoint site
      using people picker
    — Create a new farm by creating a new configuration database.
    — Running the PSconfig wizard to maintain/upgrade SharePoint
    — Create Site collections
— AD Attribute filtering not per RODC so affects all network
  including branches that have an RODC
— Profile service does not support LDAP import. See option
  3
Wrap up
—   Decide what functionality you require
—   Pick appropriate version of SharePoint
—   Understand the limitations
—   Design deployment of appropriate option
—   Consider Test environments in same configuration as
    security of components usually issue

More Related Content

PPTX
Building Secure Extranets with Claims-Based Authentication #SPEvo13
PPTX
SharePoint 2010 anywhere access uag vs dmz
PPTX
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
PDF
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
PPTX
Understanding SharePoint Apps, authentication and authorization infrastructur...
PPTX
Office 365 Identity Management options
PPTX
OFM AIA FP Implementation View and Case Study
PPTX
Office 365-single-sign-on-with-adfs
Building Secure Extranets with Claims-Based Authentication #SPEvo13
SharePoint 2010 anywhere access uag vs dmz
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
Understanding SharePoint Apps, authentication and authorization infrastructur...
Office 365 Identity Management options
OFM AIA FP Implementation View and Case Study
Office 365-single-sign-on-with-adfs

What's hot (20)

PPTX
Directory Synchronization Single Sign-On in Office 365
PPTX
Adfs azure
PDF
SharePoint Fest Chicago 2014 - Anatomy of SharePoint and Office 365 Hybrid De...
PPTX
Troubleshooting Federation, ADFS, and More
PPTX
DD109 Claims Based AuthN in SharePoint 2010
PPTX
Pricing and Revenue Projection in a Cloud-Centric World
PPTX
Deep Dive into SharePoint Topologies and Server Architecture for SharePoint 2013
PPTX
Adfs Shib Interop Um Oxford
PPTX
Design a share point 2013 architecture – the basics
PDF
A Real World Guide to Building Highly Available Fault Tolerant SharePoint Farms
PPT
SharePoint Topology
PPTX
Identity Management in SharePoint 2013
PPTX
Workshop: Advanced Federation Use-Cases with PingFederate
PDF
SharePoint Fest Chicago 2015 - Anatomy of configuring provider hosted add-in...
PPTX
Leveraging SharePoint for Extranets
PPTX
It112 SharePoint 2010 Mythbusters
PPTX
SharePoint, ADFS and Claims Auth
PDF
Office 365 identity
PPTX
Designing for SharePoint Provider Hosted Apps
PPTX
HAD05: Collaborating with Extranet Partners on SharePoint 2010
Directory Synchronization Single Sign-On in Office 365
Adfs azure
SharePoint Fest Chicago 2014 - Anatomy of SharePoint and Office 365 Hybrid De...
Troubleshooting Federation, ADFS, and More
DD109 Claims Based AuthN in SharePoint 2010
Pricing and Revenue Projection in a Cloud-Centric World
Deep Dive into SharePoint Topologies and Server Architecture for SharePoint 2013
Adfs Shib Interop Um Oxford
Design a share point 2013 architecture – the basics
A Real World Guide to Building Highly Available Fault Tolerant SharePoint Farms
SharePoint Topology
Identity Management in SharePoint 2013
Workshop: Advanced Federation Use-Cases with PingFederate
SharePoint Fest Chicago 2015 - Anatomy of configuring provider hosted add-in...
Leveraging SharePoint for Extranets
It112 SharePoint 2010 Mythbusters
SharePoint, ADFS and Claims Auth
Office 365 identity
Designing for SharePoint Provider Hosted Apps
HAD05: Collaborating with Extranet Partners on SharePoint 2010
Ad

Viewers also liked (6)

PDF
Intranet and extranet best practices
PPTX
SharePoint: Internet, Intranet, Extranet - Bringing Organizations Together
PPTX
Lunch 'n Learn - Word: templates & styles
PPTX
SharePoint 2013 Document Management Features
PDF
Document Management in SharePoint without folders - Introduction to Metadata
PPTX
10 Best Productivity Features in SharePoint 2013
Intranet and extranet best practices
SharePoint: Internet, Intranet, Extranet - Bringing Organizations Together
Lunch 'n Learn - Word: templates & styles
SharePoint 2013 Document Management Features
Document Management in SharePoint without folders - Introduction to Metadata
10 Best Productivity Features in SharePoint 2013
Ad

Similar to Deploying an Extranet on SharePoint (20)

PPTX
Clavister security for virtualized environment
PPTX
Managing Windows RT devices in the Enterprise
PPTX
1. introduzione a TMG
PPTX
Straight Talk on Data Tokenization for PCI & Cloud
PDF
EAI example
PDF
Regulatory compliant cloud computing rethinking web application architectures...
PDF
Intoto Linley Tech Utm Architecture Presentation
PPTX
50357 a enu-module02
PPTX
Tokenization Webinar featuring Securosis - Intel
PPTX
Discovering Vulnerabilities For Fun and Profit
PDF
DSS ITSEC 2012 ForeScout Technical RIGA
PPTX
50357 a enu-module01
PPTX
Secure Your AWS Cloud Data by Porticor
PDF
G3sixty Overview
PDF
The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...
PPTX
Configuring and Implementing DirectAccess with Windows Server 2012
PPTX
Clavister security for virtualized environment
Managing Windows RT devices in the Enterprise
1. introduzione a TMG
Straight Talk on Data Tokenization for PCI & Cloud
EAI example
Regulatory compliant cloud computing rethinking web application architectures...
Intoto Linley Tech Utm Architecture Presentation
50357 a enu-module02
Tokenization Webinar featuring Securosis - Intel
Discovering Vulnerabilities For Fun and Profit
DSS ITSEC 2012 ForeScout Technical RIGA
50357 a enu-module01
Secure Your AWS Cloud Data by Porticor
G3sixty Overview
The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...
Configuring and Implementing DirectAccess with Windows Server 2012

Recently uploaded (20)

PDF
Fitaura: AI & Machine Learning Powered Fitness Tracker
PDF
Decision Optimization - From Theory to Practice
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PPTX
maintenance powerrpoint for adaprive and preventive
PDF
Human Computer Interaction Miterm Lesson
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
GDG Cloud Southlake #45: Patrick Debois: The Impact of GenAI on Development a...
PPTX
CRM(Customer Relationship Managmnet) Presentation
PDF
Introduction to c language from lecture slides
PDF
Technical Debt in the AI Coding Era - By Antonio Bianco
PDF
The AI Revolution in Customer Service - 2025
PDF
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
PDF
Ericsson 5G Feature,KPIs Analysis_ Overview, Dependencies & Recommendations (...
PPTX
From XAI to XEE through Influence and Provenance.Controlling model fairness o...
PDF
Altius execution marketplace concept.pdf
PDF
CEH Module 2 Footprinting CEH V13, concepts
PDF
ELLIE29.pdfWETWETAWTAWETAETAETERTRTERTER
PDF
Ebook - The Future of AI A Comprehensive Guide.pdf
Fitaura: AI & Machine Learning Powered Fitness Tracker
Decision Optimization - From Theory to Practice
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
maintenance powerrpoint for adaprive and preventive
Human Computer Interaction Miterm Lesson
Connector Corner: Transform Unstructured Documents with Agentic Automation
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Data Virtualization in Action: Scaling APIs and Apps with FME
GDG Cloud Southlake #45: Patrick Debois: The Impact of GenAI on Development a...
CRM(Customer Relationship Managmnet) Presentation
Introduction to c language from lecture slides
Technical Debt in the AI Coding Era - By Antonio Bianco
The AI Revolution in Customer Service - 2025
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
Ericsson 5G Feature,KPIs Analysis_ Overview, Dependencies & Recommendations (...
From XAI to XEE through Influence and Provenance.Controlling model fairness o...
Altius execution marketplace concept.pdf
CEH Module 2 Footprinting CEH V13, concepts
ELLIE29.pdfWETWETAWTAWETAETAETERTRTERTER
Ebook - The Future of AI A Comprehensive Guide.pdf

Deploying an Extranet on SharePoint

  • 1. Deploying a SharePoint Extranet By Alan Marshall Twitter: pomealan Linkedin:http://nz.linkedin.com/pub/alan- marshall/3/980/267 Acknowledgements: Chandan Banerjee and Wayne Ewington (Microsoft)
  • 2. Session Agenda — Extranet Definition — Implementation Scenarios — Design Considerations and Challenges — Deployment topologies — Which SharePoint version and licenses — Hints and Tips — Wrap up
  • 3. What is an Extranet ex-tra-net [ek-struh-net] — Noun An intranet that is partially accessile to authorized persons outside of a company or organisation. A network (as of a company) similar to an intranet that also allows access by certain others (such as customer or suppliers)
  • 4. Implementation Scenarios Share secure Collaborate with Personalised Remote Access information Partners Customer Portal •Employees •Provide reports •Design a •View loyalty working to suppliers solution card remotely •Display order •Request transactions •Teleworkers tracking support •Reward •Student Portal schemes •Specialised content
  • 5. Design Considerations and Challenges — Authentication — Single Sign-on — Managing accounts — Security — Sensitivity of data — Protect against resources being compromised — SharePoint Platform — How much do you trust external users — Platform deployment requirements — Features required — Which version of SharePoint? Foundation, Server, Enterprise — Integration — License Costs — Network infrastructure
  • 6. Implementation Options — Option 1 – Provide access to internal SharePoint Server — Remote Employees — Partners — Option 2 – Publish content to an external environment (read only) — Share secure information — Remote Employees — Partners — Option 3 – Provide an Extranet Farm dual authenticated — Share secure information — Partners — Customer Portal — Option 4 – Host in the cloud — Partners — Customer Portal
  • 7. Option 1 – Perimeter Proxy Internet DMZ Internal Network • Threat Management Gateway (TMG) – acts as a reverse proxy SharePoint Farm translating external encrypted traffic to internal SharePoint server. HTTPS HTTPS HTTP • Firewall ports required for 443 Perimeter externally and 80 internal LAN Remote Employees Firewall TMG Server LAN Firewall firewall. • Authentication occurs on Authentication SharePoint Web Front ends with internal AD Unknown User Device • Virus Scanner • Private Browsing Unauthenticated traffic
  • 8. What’s TMG — Threat Management Gateway — Formally ISA Server — Forefront TMG server features — URL filtering — antimalware inspection — intrusion prevention — application- and network-layer firewall — HTTP/HTTPS inspection in a single solution — Reverse Proxy HTTP – HTTPS — Authentication – including 2 phase
  • 9. Option 1a – Perimeter Proxy with RODC Internet DMZ Internal Network • TMG – performs authentication and acts as a reverse proxy translating TMG Server SharePoint Farm external encrypted traffic to internal SharePoint server. HTTPS HTTPS HTTP • Firewall ports required for 443 Perimeter externally and 80 internal LAN Remote Employees Firewall LAN Firewall firewall, plus ports for IPSec Authentication • Authentication occurs on the TMG Server with the Read Only Domain Secure Controller (RODC). Account Replication RODC Active Server Directory Unknown User Device • Virus Scanner Accounts replicated to DMZ • Private Browsing • Subset of attributes • Admin accounts excluded • No updates permitted • Windows 2008 feature
  • 10. What’s an RODC — Read Only Domain Controller — Windows Server 2008 — Removes the need for a trust between domains — Limit replication accounts and attributes
  • 11. Option 1b – Perimeter Proxy with RODC and UAG Internet DMZ Internal Network • Unified Access Gateway (UAG) replaces TMG – performs UAG Server SharePoint Farm authentication, user privilege throttling, acts as a reverse proxy HTTPS HTTPS HTTP translating external encrypted Perimeter traffic to internal SharePoint server. Remote Employees Firewall LAN Firewall • Firewall ports required for 443 Authentication externally and 80 internal LAN firewall, plus ports for IPSec Secure • Authentication occurs on the UAG Account Server with the Read Only Domain Replication Controller (RODC) RODC Server Accounts replicated to DMZ • Subset of attributes • Admin accounts excluded • No updates permitted
  • 12. UAG — Unified Access Gateway — Spin-off of ISA Server — Remote Access to SharePoint and/or Exchange. — granular application filtering capabilities — deep endpoint health detection — wizard driven configuration — Comprehensive Remote Access (SSL VPN) — DirectAccess
  • 13. Option 2 – Publish content Internet DMZ Internal Network • Threat Management Gateway (TMG) – Authentication, Reverse SharePoint Farm Proxy. HTTPS HTTPS Content Deployment • Firewall ports required for central admin port outbound and External Perimeter Firewall TMG HTTPS LAN Firewall externally 443. People Server • All or part of intranet is content Authentication deployed to the DMZ server SharePoint Server(s) IntegrationActive options SQL Server • Limited integration with back- Directory DMZ AD end systems New SharePoint Farm • Same version as internal • Separate domain and SQL Separate domain • No single sign on for internal users
  • 14. Option 3 - Extranet Farm dual authenticated Internet DMZ Internal Network Internal • Unified Access Gateway (UAG) – UAG Server Users Authentication. Note TMG does not LAN Firewall support Forms hand off. HTTPS HTTPS HTTP • Firewall ports required for IPSec AD replication External Perimeter Firewall • All content accessed by internal People and external users is hosted in Authenticate LDAP External SQL Server DMZ Users Internal Users • Data layer (SQL) is separated into Separate SharePoint Authenticate Replicate farm another network layer SharePoint • No content sharing Shared SQL Environment Accounts Active (use Server(s) Extranet AD or LDS workflow or third party)Authentication for Server Directory SQL • Consideration to IAnot supported for DMZ AD useability SharePoint 2010 configured CLAIMS authentication
  • 15. Option 3a - Extranet Farm dual authenticated with ADFS Internet Corp A DMZ Internal Network Internal UAG Server Users • Unified Access Gateway (UAG) – All LAN Firewall access and authentication. HTTPS HTTPS HTTPS • Firewall ports required for IPSec AD replication and ADFS port 443 External Perimeter Firewall • All content accessed by internal People and external users is hosted in All user SQL Server DMZ Authentication SharePoint • Data layer (SQL) is separated into Service Accounts another network layer Replicate Accounts • ADFS server hands off SharePoint ADFS 2.0 Server(s) Active authentication to internal AD or ADFS 2.0 Directory Server Proxy Server partner AD DMZ AD ADFS 2.0 Server Authentication hand off
  • 16. Option 4 – use the cloud — All content Internet Internal Network stored in SharePoint cloud service HTTPS Remote Perimeter Internal — Internal users Employees Firewall Users authenticated against replicated AD Secure Account Replication Internal AD — External users use Windows Live ID Content Sharing - Use workflow or third party tool - Content deployment not supported
  • 17. Which SharePoint version Applicable to Deployment Licences option SharePoint Collaboration Option 3 - 4 Windows Foundation (or Solutions External Search server Connector SQL express) CPU SharePoint Portals with WCM, Option 3 – 4 SharePoint Std Server 2010 Profiles, Option 1 for read CAL Std Intranet publishing only SQL CPU or CAL SharePoint Same as Std+ Option 3 SharePoint Server 2010 form services, BI Std+Ent CAL Ent and FAST SQL CPU or CAL SharePoint Anonymous or Option 3 - 4 SharePoint FIS Server 2010 unknown user base SQL CPU FIS
  • 18. Component Parts — DMZ — Unified Access Gateway — Threat Management Gateway — SharePoint Foundation — SharePoint Server — Standard — Enterprise — Active Directory — Active Directory Lightweight Directory Services — Active Directory Federated Services — SQL Server — IPSec
  • 19. Hints and Tips — When using an RODC with SharePoint member server direct access to RWDC required to: — Try to find a user who is not currently existing in a SharePoint site using people picker — Create a new farm by creating a new configuration database. — Running the PSconfig wizard to maintain/upgrade SharePoint — Create Site collections — AD Attribute filtering not per RODC so affects all network including branches that have an RODC — Profile service does not support LDAP import. See option 3
  • 20. Wrap up — Decide what functionality you require — Pick appropriate version of SharePoint — Understand the limitations — Design deployment of appropriate option — Consider Test environments in same configuration as security of components usually issue