Microsoft Office Tutorials and References
In Depth Information
FIGURE 10.25
The Security
Configuration settings
7. In this example, allow anonymous access by selecting Yes (the default is No) so the user
blogs will have the option to be read by everyone on the network without logging in.
Use Secure Sockets Layer (SSL) If you want to use SSL to encrypt all the sites in the
web application, you can turn on SSL (changing the path from http://spf2:8080 to
https://spf2:8080). We discuss more details about SSL in Chapter 16, “Advanced
Installation and Configuration.”
8. For this example, SSL is unnecessary, so keep No selected for this setting.
Claims Authentication Types This section changed when we selected Claims
Based Authentication earlier. Now it allows us to configure Windows authentication,
forms-based authentication, and SAML-based trusted identity partners (this option
is grayed out because our network does not have any configured). Under Windows
Authentication, you have the normal choices: Integrated (NTLM or Kerberos) and Basic
(clear-text passwords). In this case, we’ll be using Windows authentication and keeping
the default, NTLM.
9. Keep the authentication types set to the default of NTLM .
Sign In Page URL Also with claims-based authentication is the need for a login
page—either default or custom. This is triggered only if the user doesn’t already
have a claims token.
10. Leave the default sign-in page.
Search JabSto ::




Custom Search