Microsoft Office Tutorials and References
In Depth Information
Excel Services does not support opening workbooks with most of the client security-related
features, including restricted content (Information Rights Management), digital signature,
encryption, and workbook and sheet protection.
The communication between the WFE and the ECS can be done through a trusted subsystem or
credentials delegation.
Files are loaded from SharePoint by checking the end user’s permissions. Depending on the
configuration, UNC and HTTP files can be loaded by using the process account.
When loading data from external data sources, the credentials can be delegated through
Kerberos-constrained delegation, be mapped to different SSO credentials, or use a predefined
Unattended Account.
Malicious users could try to attack the server or use the server to attack other machines (such as
databases). You should configure the server in a secure way to prevent these attacks.
Spoofing means pretending to be another user. The main prevention is to protect passwords and
not send or store them in clear text.
Tampering with data means changing data that the attacker should not be allowed to do. The
main preventions are to secure communications between the components and limit write access
to databases.
Repudiation means that a malicious can get away with an attempt to perform something
without a way to prove it. Auditing and logging are ways to track the user’s actions.
Information disclosure is a way for an attacker to steal information. Mitigations include secure
communications over the network and limited permissions on critical resources.
Denial of service means overloading a server in a way that reduces its availability. Limiting the
attack surface and reducing trusted locations privileges are possible solutions.
Elevation of privileges means gaining higher rights, such as those of an administrator.
Education of the administrators and securing configuration of the server are critical.
The last part of this topic contains step-by-step instructions for implementing the important Excel Services
scenarios. Chapter 9 discusses publishing workbooks to the server. In Chapter 10, you learn about
interacting with the workbook on the server. In Chapter 11, you find out about controlling those workbooks and
the relationships with other Office Server features. Chapter 12 shows the Business Intelligence scenario,
including dashboards. Chapter 13 explains how to use Excel Services to offload heavy calculations. In
Chapter 14, you learn about extending Excel Services in programmability scenarios.
Search JabSto ::

Custom Search