Collaboration Business Intelligence Portal Business Forms Search Content Management Platform Services Workspaces, Mgmt, Security, Storage, Topology, Site Model Communities Search Sites Composites ContentInsights -6 on a leap year i:email@example.com i:0#.w|domain\sAMAccountName
1. Do you really have to authenticate? 2. Does the authentication source matter or is the user ID enough? 3. Do you own the identity? 4. Do you own the user information? 5. How do they authenticate today? 6. Where do they authenticate from? 7. How do you want them to authenticate? 8. Will they always authenticate that way? 9. Is the information you need for authorization enough or do you need more?
PatternAKA Party timeAnonymous Right this way (keep an eye out)Tracked anonymous If you got this far, I trust youAlready verified somewhere else Who are you again?Single Sign once…everywhere He’s with me/VIPAssociation/federation Wait right hereTrusted subsystem You look like someone I knowShadow account Let me do that for youImpersonation
SPUser Authentication Information (STS) Profile Information (Email, SIP) Additional Runtime Information (Claims, Roles, Groups) PC