Secure Store Service
The Secure Store Service is a SharePoint service that provides a secure way to store and manage credentials for accessing data sources. It allows organizations to securely store information such as usernames and passwords for applications and services that require authentication.
Features
- Secure Storage: Credentials are stored in an encrypted format, ensuring that sensitive information is protected.
- Single Sign-On: Enables a single sign-on experience for users by automatically supplying stored credentials when accessing external applications.
- Target Applications: Credentials can be associated with target applications, allowing various services to access these credentials as needed.
- Access Control: Administrators can define access to the Secure Store data, controlling which users or groups can utilize specific stored credentials.
Use Cases
- Connecting to external databases like SQL Server.
- Accessing web services that require authentication.
- Integrating with other applications without exposing sensitive username and password information.
Configuration Steps
- 1. Enable the Secure Store Service in Central Administration.
- 2. Create a Secure Store Entity that defines the credentials for a specific application or service.
- 3. Assign Permissions to control who can access the stored credentials.
- 4. Use the Credentials in SharePoint applications, workflows, and web parts that need to authenticate externally.
Best Practices
- Regularly review and rotate stored credentials to enhance security.
- Limit access to the Secure Store Service to only those who require it.
- Monitor usage and access logs for potential unauthorized attempts to access secured information.
For more detailed information, refer to the official Microsoft documentation on the Secure Store Service.
mindmap
SharePoint Secure Store Service
Secure Credential Storage
Store credentials securely
Centralized management
Application Ids
Unique identifier for applications
Mapping to credentials
Target Applications
Integration with SharePoint
Permissions management
Access Control
Role-based access
Secure token sharing
Administration
Configuration options
Monitoring and auditing
Related:
External links:
- LINK
Search this topic on ...
SharePoint Articles
(
A
B
C
D
E
F
H
I
I cont.
K
L
M
N
O
P
Q
R
S
S cont.
T
U
V
W