Solved

How are you handling SharePoint 2013 Extranet

Posted on 2014-09-25
2
23 Views
Last Modified: 2015-06-12
What is your infrastructure? Are you using reverse proxy? Who's?
What kind of authentication?

If you could please describe your scenarios, I'd appreciate it.
0
Comment
Question by:Montoya
2 Comments
 
LVL 11

Accepted Solution

by:
FastFngrz earned 500 total points
ID: 40353842
As an extranet, most would put the entire farm in a DMZ, secured with good backups, account lockout enabled and an ssl to encrypt everything.  However, many just poke a hole in the firewall and expose 443 to the internal front end servers.  If you are using a reverse proxy, make sure it understands all the WebDAV verbs a site can use.

More appropriately , what are the policies you have to abide by?   That will dictate what security you put in place.  Many folks have a DMZ, but allow servers in the DMZ to initiate inbound connections to the corporate network.  Others would choke at such a vulnerability.  Again, depends on policy.
0
 
LVL 19

Author Comment

by:Montoya
ID: 40363536
trying to leave question open, hoping for more feedback..

Thank you Fast.. for your input.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
multidimensional array 4 40
SPO Open List from Other List in Dialog with Filter 3 49
InfoPath Business days 1 60
File size limit in SharePoint 2010 5 46
Pimping Sharepoint 2007 without Server-Side Code Part 1 One of my biggest frustrations with Sharepoint 2007 in the corporate world is that while good-intentioned managers lock down the more interesting capabilities of Sharepoint programming in…
We had a requirement to extract data from a SharePoint 2010 Customer List into a CSV file and then place the CSV file into a directory on the network so that the file could be consumed by an AS400 system. I will share in Part 1 how to Extract the Da…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

815 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now