Microsoft Office Tutorials and References
In Depth Information
10.
When a user with insufficient permissions tries to access the external list, he will be
presented with a link to authenticate, as shown in Figure 4-21 .
Figure 4-21. Authenticate with credentials
11.
After clicking the link, the user will be presented with a window for entering his credentials
(Figure 4-22 ), and on successful validation, he will have access to the back-end system data.
Figure 4-22. Manage credentials for SSS target application
Now that you have configured ECT with the SSS Application ID, users can access external data via an external list
in SharePoint without encountering any issues.
 
Search JabSto ::




Custom Search