In his SharePoint Fest
Chicago session, SharePoint 2013 Sharing and Security, Dan Holme set out
to demystify security and sharing providing some best practice guidelines.
In front of a standing room only crowd, Dan opened the session with a quick
review of the fundamental components that are involved in providing users with
Users – Objects at the site collection level linked to identity in
the authentication provider.
Permissions levels – Most Common:
Full Control, Design, Contribute, Read.
Security Scope – What is the securable object? Site, Library or
List, Folder, Item.
Role Assignment – Association between the security scope,
permission and the user.
Groups – Collections of users who have common access requirements
to a specific security scope. Owners,
Members and Visitors are the default groups.
With the high-level review
complete, Dan went into a deeper examination of the nuances associated with
each of these security components.
User objects are created at the
root of the site collection and are created when:
- An administrator or group owner adds users to a group
- A user requests access to a site
- A user is granted direct permissions
- A user with access through an AD group makes a change to the site,
such as uploading a document, that requires the user to be associated with
something in the Content Db.
A list of the user objects can be
accessed clicking into any group on your site collection, and modifying the
query string to change the membership ID to 0.
While the option to Delete
Users from the Site Collection is provided, Dan emphasized the point that
deleting users from the site collection can break a number of things, including
Created By references that read the user object.
Regardless of where they are
created, group objects reside at the root of the site collection. It is also very important to understand when
“To Nest” or “Not to Nest” groups.
The conversation started with a
look at the advantages:
- Easy to grant users permissions
- Centralized role-based management
And, the disadvantages:
If users are in an Active Directory group and that group is added
to a SharePoint group to gain access to the securable object, there will be no
visibility in SharePoint that the user has access to the site if the user has
not made a change that resulted in the creation of a user object.
Potential loss of functionality (the extent of functionally loss
is dependent on environment configuration etc.) with People picker controls,
Alerts, Task Assignment, etc. until a user object is created.
Having shared the advantages and
disadvantages associated with nesting groups, Dan provided the guidance
looking at the extremes at both ends of the spectrum.
Add AD group’s Domain user to the
SharePoint group for easy access management.
Add users directly to SharePoint
This provides visibility to site owners and members as to who has
access to the site, and supports
For everything in between those
extremes, decisions will need to be made based on visibility and functionality
requirements and ease of management requirements.
SharePoint 2013 comes with the
new Edit permission level that is the default for Members groups created
with team sites.
Edit = Contribute + Manage Lists
This could easily
provide users more permissions on your site, so knowing
the new default is critical for any Site Administrator. However, as
Dan pointed out, not all Members groups will have the Edit permission
level. If the site was originally
created in a SharePoint 2010 environment, the Members group associated with
that site will maintain the Contribute permission level.
Dan also addressed how permissions work with the SharePoint 2013 Sharing interface. Sharing can, and often will, break
inheritance. However, SharePoint 2013 is smart enough that if the user with
whom the item is shared already has membership to a group that has
permission to the item, inheritance will not be broken.
After dispensing an impressive
amount of information to an appreciative audience, Dan reminded everyone to
“Say ‘No’ to Full Control,” and like everything else that Dan
imparted, it is information well worth remembering.