8

Working with BCS Security

WHAT’S IN THIS CHAPTER?

  • Understand server authentication options
  • Understand the Secure Store Service
  • Understand client authentication options
  • Understand claims authentication

Security with regard to authentication and authorization is an integral part of connecting to any system. When you connect to an External System through Business Connectivity Services, security can take on new levels of complexity as user context changes through various security schemes, impersonation, and delegation. Furthermore, the data in External Systems is likely to be valuable or sensitive. BCS developers have a serious responsibility to ensure that appropriate authentication and authorization controls are in place for their solutions. Therefore, a thorough understanding of security scenarios is critical to creating successful BCS solutions.

This chapter presents the different security models and how they affect BCS solutions from Integrated Windows Authentication to claims-based authentication. For each case, some background information is provided, followed by configuration options for BCS. These options will allow you to create BCS solutions that work correctly in your environment.

UNDERSTANDING BDC PERMISSIONS

All the BCS models created in SharePoint Designer or Visual Studio are ultimately stored in the BDC Metadata catalog. Access to the BDC Metadata catalog is managed through the Business Data Connectivity service application. Before examining the various security ...

Get Professional Business Connectivity Services in SharePoint® 2010 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.