16.01.2013 Views

Microsoft Sharepoint Products and Technologies Resource Kit eBook

Microsoft Sharepoint Products and Technologies Resource Kit eBook

Microsoft Sharepoint Products and Technologies Resource Kit eBook

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

696 Part VIII: Securing SharePoint <strong>Products</strong> <strong>and</strong> <strong>Technologies</strong><br />

the necessary information that is then presented to the user within the Web Part.<br />

This process is shown in Figure 26-1. The steps are as follows:<br />

1. A user accesses the Web Part that integrates with the enterprise application for<br />

the first time. The Web Part code checks whether the user credentials for the<br />

required application are stored in the single sign-on database. If they are<br />

stored, the process continues from step 6 in this list.<br />

2. If there are no credentials stored for this user for the required application, the<br />

user’s browser is redirected to the logon form for this application.<br />

3. The user supplies credentials for the application.<br />

4. The supplied credentials are mapped to the user’s Windows account <strong>and</strong><br />

stored in the single sign-on database.<br />

5. User is redirected to the original Web Part.<br />

6. The Web Part retrieves the credentials from the single sign-on database.<br />

7. The Web Part submits the credentials to the enterprise application <strong>and</strong> retrieves<br />

the necessary information.<br />

8. The Web Part is displayed to the user.<br />

On subsequent access, when the user requests the Web Part, to get the necessary<br />

data from the enterprise application the credentials are retrieved from the single<br />

sign-on database. The process is transparent to the user. (See Figure 26-1.)<br />

User<br />

1<br />

2<br />

3<br />

5<br />

8<br />

SharePoint<br />

Portal Server<br />

SSO<br />

database<br />

SQL Server<br />

F26XR01<br />

Figure 26-1 Accessing an enterprise application using single sign-on<br />

4<br />

6<br />

Back-end<br />

enterprise<br />

application<br />

When group enterprise definition is used, the account mapping is configured<br />

by the administrator. The administrator specifies the credentials for accessing the<br />

enterprise applications that are valid for all members of a Windows group. If the<br />

7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!