4.5. Summary

Security is a big area, and there is no way we can touch on every aspect of it in this chapter. You have, however, learned some key ideas regarding security and Team Foundation Server, which should help you in securing your servers.

At the beginning of this chapter, we discussed the Team Foundation Server environment and how users are authenticated into the system. We then began an in-depth look at the Team Foundation Server Security Model and the different groups and permissions associated with the model. Next, we showed you how to take advantage of the security model, using both the graphical user interfaces and the command-line tools.

We discussed some of the common security access issues you will encounter with Team Foundation Server; and wrapped everything up by discussing some security best practices and showing how to enable activity logging on Team Foundation Server.

With a good understanding of Team Foundation Server security under your belt, we can now move on to discussing disaster recovery options. Chapter 5 discusses some troubleshooting tips for Team Foundation Server, and then provides instructions on how to ensure a successful backup of your Team Foundation Server data.

Get Professional Team Foundation Server now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.