Course description
SharePoint has a very comprehensive security system, and the part that is of most interest to developers is the security within a SharePoint site. Within a site you work with users and groups, permission levels, permissions for sites, lists and list items. In this course you will have the know-how to understand and program with users and groups, create and apply permissions, and how to configure anonymous access permissions programmatically.
Prerequisites
This course assumes that students have some Web development background and some experience using Visual Studio 2012.
Learning Paths
This course will help you prepare for the following certifications and exams:
MCSD: SharePoint Applications
70-489: Developing Microsoft SharePoint Server 2013 Advanced Solutions
70-488: Developing Microsoft SharePoint Server 2013 Core Solutions
This course is part of the following LearnNowOnline SuccessPaths™:
SharePoint 2013 Developer
Meet the expert
Tim McCarthy is a senior solutions architect with Perficient who designs and builds highly scalable, layered web, desktop, and mobile applications utilizing the latest Microsoft platforms and technologies.
Course outline
Security
Overview (04:11)
- Introduction (00:09)
- Overview (00:34)
- Overview - cont'd (01:09)
- Demo: SP Site Security (02:10)
- Summary (00:06)
Users And Groups (34:09)
- Introduction (00:09)
- SharePoint Users and Groups (01:56)
- User Classes (00:29)
- Group Classes (00:25)
- SPGroupCollection (00:52)
- AssociatedGroups (01:10)
- Demo: Create SP Group (04:32)
- SPUserCollection (01:22)
- SPWeb.EnsureUser (03:20)
- User Information List (02:02)
- Demo: SPUser - add group (05:09)
- Demo: SPUser - add user (06:09)
- Demo: SPUser - run test (05:04)
- Demo: SPUser - takeaway (01:14)
- Summary (00:11)
Permissions (12:26)
- Introduction (00:11)
- Permissions (01:14)
- Groups & Permission Levels (00:45)
- Team Site Permission Levels (00:47)
- Level Granularity - Lists (01:03)
- Level Granularity - Sites (00:26)
- Personalization Permissions (00:56)
- Demo:ApplyPermissionLevel 1 (04:20)
- Demo: ApplyPermissionLevel 2 (02:31)
- Summary (00:10)
Security Inheritance (29:02)
- Introduction (00:10)
- Objects and Inheritance (01:51)
- Breaking Inheritance (01:27)
- Demo: Break Role Method (04:44)
- Demo: Use assigned to field (01:36)
- Demo: Check task (00:41)
- Demo: Create Assigning Role (03:37)
- Demo: Run Assigning Role (00:55)
- Demo: Set Permission (03:52)
- Demo: Bind Role (03:02)
- Demo: Set Permissions (03:41)
- Demo: Site Permissions (01:17)
- Demo: Test Role (01:54)
- Summary (00:09)
Identifying Permissions (10:04)
- Introduction (00:12)
- Identifying User Permissions (01:21)
- Security Trimming (03:13)
- Demo: Custom Action (05:07)
- Summary (00:09)
Anonymous Access (06:19)
- Introduction (00:08)
- Anonymous Access (01:29)
- Demo: AnonPermMask64 (04:34)
- Summary (00:06)