Security and Identity (Authentication)

A Web application also defines the authentication protocol used to access related site collections. For instance, a Web application maps directly to an IIS website and SharePoint server administrators can choose to enable anonymous access, forms authentication, or NTLM or Kerberos authentication. An organization might choose to create additional Web applications in an environment where customers need to access content anonymously, such as in an Internet, or public-facing, SharePoint site. The more Web applications within a farm, the greater the administrative overhead.

The authentication methods and protocols in SharePoint 2010 are extensible. Authentication protocols include Windows (Anonymous, Digest, ...

Get Microsoft® SharePoint® Designer 2010 Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.