O'Reilly logo

Automating Microsoft® SharePoint® 2010 Administration with Windows PowerShell® 2.0 by Shannon Bray, Gary Lapointe

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understand the Various Forms of Authentication

Fundamentally, any application platform will use one of two models for authentication: trusted subsystem or impersonation/delegation.

A trusted subsystem is a service that will validate the credentials of the end user but, from that point forward, access all of the resources using a service account identity. This type of model allows you to perform actions like connection pooling and caching. If you look at Application Pools in IIS, the trusted subsystem model allows you to use a service account without storing the credentials in a plain-text file, thus compromising your accounts. Ultimately, SharePoint serves as a trusted subsystem using Windows credentials. This is evident when you have to grant ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required