Contact Us
Please fill out the form below and we will get in touch within four business hours.

*
*
*
*
*
*
*Interested In:
(Check all that apply)



 
 
Synergy Corporate Technologies
Synergyonline > Blog > Posts > SharePoint Site Collection Security–‘Trickle down approach’
December 15

SharePoint Site Collection Security–‘Trickle down approach’

I was asked a very good question by a client recently and it is one in which experienced SharePoint administrators and architects would be aware. While you can solve many things in Microsoft applications in a great many ways, it’s often difficult to balance ease of use, ease of AD DS Administration and ease of SharePoint Administration all at the same time.

As your Administrator may or may not know, security in SharePoint 2010 is ‘typically’ guided by Global Groups and User accounts from within Microsoft Active Directory (AD) domain infrastructures. These are in turn ‘typically’ made members of SharePoint Groups which govern the hierarchical elements of SharePoint. This hierarchy has a ‘flow on effect’ or ‘trickle down approach’ of inheritance by default. Therefore, if you set security at one level of the SharePoint tree, any elements beneath it will inherit those security values. This allows for simple allocation of users and groups to resources by centrally maintaining your core directory services and SharePoint resources. The great thing is we can vary this inheritance by disabling it at many levels within the tree and starting inheritance from scratch.

 

clip_image002The issue you can experience here is that by following the methodology above, many SharePoint administrators will allocate the Default Domain Users or Authenticated Users group which is populated with every user account in your Active Directory domain to Default SharePoint Groups like the Visitors group at the Site Collection level. This SharePoint group has read access to any and all SharePoint resources it is associated to within the SharePoint hierarchy starting from that site collection and trickling down to all of its associated child elements.

The question posed here by the client was what if there was a group of people within our organisation who we do not want to view and read the Site Collection but we still want to maintain their use within the traditional Active Directory Global Group ‘Domain Users’ for ease of use?

How do we solve this?

 

Typically for a SharePoint site, weclip_image004 should only add SharePoint groups and groups/users from our Active Directory domain to that Site with a corresponding permission level assigned for that Site and any subsidiary elements. If there is an element below the site that we need to restrict further then we need to break inheritance and assign permissions uniquely at that level as mentioned previously. This top-down approach to security is essential to good SharePoint security and one to pass on to all SharePoint object creators. In my own words, ‘Put security in-place at Creation’.

As it is quite likely that some of the SharePoint groups for many SharePoint Portals would include the Domain Users AD groups, all user accounts you want to restrict from your SharePoint infrastructure would need to be removed from these default groups. This is generally not feasible as other systems would be dependent on these accounts being in the ‘Domain Users’ group. Another method would be to list all departmental groups – IF and only IF these groups covered the entire organisations SharePoint portal audience. Therefore, a heavy reliance upon a well maintained AD environment is essential (it is in general as well).

Solution:

Well how can we solve this? Glad you asked. Rather than modify the SharePoint group membership from the Central Administration site in SharePoint we can specify a DENY ALL policy at that level for any user or AD group.

I recommend that you create a ‘<InsertGroupFunctionNamehere> Deny Access’ AD security group populated with the users and\or groups who should not have access.

After this the SharePoint Administrator can use this procedure to modify the web application policy which sits above the Site Collection hierarchy as its parent:

1. Make sure the above Deny Access ad Group is created and populated in AD.

2. Open Central Administration

clip_image006 

3. Under the Application Management section, click on Manage Web Applications

4. Click to highlight your Web Application, e.g.. portal.synergy.com

5. Click User Policy from the Web Applications Tab in the Ribbon.

clip_image008 

6. Click Add Users, leaving (All Zones) as the default drop down box, click next.

clip_image010 

7. Add the ‘<InsertGroupFunctionNamehere> Deny Access’ AD security group that you would like to deny access to this Web Application.

8. Choose Deny All as the permissions that will be assigned to them. Note: this can be varied.

9. Click Finish.

These users will now be shown ‘Access is Denied’ from any sites contained in this web application even though they have permissions wherever their group membership is defined as Deny permissions override Allow permissions.

After this has been setup you can control who is denied access to your SharePoint Portal by maintaining the membership of this group. As a tip remember that AD Security Groups can be nested. Granting access to the areas of the Portal is controlled by the membership of the SharePoint groups.

I hope this assists you with your SharePoint security endeavours.

Comments

There are no comments for this post.

Add Comment

Items on this list require content approval. Your submission will not appear in public views until approved by someone with proper rights. More information on content approval.

Title


Body *


Captcha

 

Attachments


United States
55 Greens Farms Road
Westport, CT 06880
 
1050 Bishop St.
Suite 176
Honolulu, HI 96813
United Kingdom
Unit 13 Elder Way Waterside Drive Langley Berkshire SL3 6EP
United Kingdom
Singapore
Level 37
Ocean Financial Centre
10 Collyer Quay
Singapore 049315
Asia Pacific
Level 6
115 Pitt Street
Sydney NSW 2000
Australia 
+1800-930-4771
+44 (0)1753 541 000
+(65) 6232 2329
+61 2 9113 7243
United States
United Kingdom
Singapore
Australia
This web page conforms to W3C's "Web Content Accessibility Guidelines 1.0" Level "A" © 2014 Synergy Corporate Technologies
This site is best viewed in IE8 or above. Some features may not render properly if you are using an older browser.