Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Installing Microsoft SharePoint Server 2010 and Configuring PerformancePoint Services : Configuring PPS (part 1) - Configuring the Secure Store Service

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/22/2011 3:50:58 PM
After SharePoint has been installed, the next step is to configure the PPS service application. You must complete this step regardless of the installation type you selected.

In this example, you select to do a server farm installation in preparation for future expansion. The SharePoint farm starts as a single application server deployment. However, additional web and application servers can be added later to scale for future growth and expanding data requirements.

In this type of installation, the administrator needs to complete the following tasks in the order shown here:

1.
2.
3.
4.
Configure all other service applications that will be useful in the deployment, such as Excel Services or SQL Server Reporting Services Integration.

Configuring the Secure Store Service

The Secure Store Service is a service that encrypts selected data stored within it. A user-generated encryption key is required to ensure that the data is secure. This is a new addition to the SharePoint feature set in SharePoint 2010.

Note

For security reasons, PPS requires the Secure Store Service to be manually configured before it can be used. This ensures that passwords are not stored as plain text in the database.


The data that is encrypted is

  • Unattended Service Account credentials. This is a domain account used by default to access data sources.

To configure the Secure Store Service, follow these steps:

1.
Launch SharePoint Central Administration from the Start menu. Select Start, All Programs, Microsoft SharePoint 2010 Products, SharePoint 2010 Central Administration.

2.
From Application Management, select Manage Service Applications.

3.
Scroll to find and select Secure Store Service, and then click Manage on the ribbon (see Figure 1).

Figure 1. Select the Secure Store Service link from this screen.

Tip

Two different types of Secure Store Service objects are created for you: the Secure Store service application and the Secure Store proxy. Both of these objects have links that should lead to the same page, which means that you may select either link.

4.
From the Secure Store Service configuration page, select Generate New Key (see Figure 2).

Figure 2. Select Generate New Key from this screen.

5.
Enter a secure passphrase in the dialog box (see Figure 3). Because it is protecting potentially sensitive data, make sure this is a strong password. Accept the check to Re-encrypt the Database Using the New Key, and then click OK. The database will be encrypted.

Figure 3. Make sure you create a strong passphrase.

Note

Wikipedia suggests the following guidelines for creating strong passwords:

  • Include numbers, symbols, and upper- and lowercase letters in passwords.

  • Password length should be between 12 and 14 characters.

  • Avoid any password based on repetition, dictionary words, letter or number sequences, usernames, relative or pet names, or biographical information.

(“Password Strength” from Wikipedia, the free encyclopedia, http://en.wikipedia.org/wiki/Strong_password#Examples_that_follow_guidelines)

Caution

To increase security, you should first configure the Central Administration pages to use Secure Sockets Layer (SSL). Alternatively, you need to ensure that the browser is running directly on the server so that Internet traffic is not going through a proxy server. If you do not do this, the passphrase you enter here can be viewed by a packet analyzer. A packet analyzer is a hardware or software utility that intercepts network traffic and allows an unauthorized user to see the password you are setting. The password appears in plain text on the HTTP packet. The packet analyzer can pick up the password you are sending to the server to configure the Unattended Service Account.

6.
When the Secure Store Service key is generated successfully and the database is encrypted, click Home to return to the Service Application Management.
Other -----------------
- Manage the Active Directory Domain Services Schema : Add Attributes to Ambiguous Name Resolution Filter
- Manage the Active Directory Domain Services Schema : Remove Attributes from the Index
- Manage the Active Directory Domain Services Schema : Index Attributes
- Windows Communication Foundation Primer : Implementing contracts in services
- Windows Communication Foundation Primer : Defining the contract
- Implementing Edge Services for an Exchange 2010 Environment : Implementing Safelist Aggregation for Outlook 2003 and Outlook 2007
- Implementing Edge Services for an Exchange 2010 Environment : Using EdgeSync to Synchronize Active Directory Information to the Edge Transport Server
- Implementing Edge Services for an Exchange 2010 Environment : Using Address Rewriting to Standardize on Domain Address Naming for an Organization
- Application Development with SharePoint Designer 2010 and Visual Studio 2010 : Developing a Visual Web Part
- Using Visual Studio 2010 with SharePoint 2010
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server