Tuesday 9 December 2014

How to Create Mysite in SharePoint 2010

How to Invite External Users to Your SharePoint Site

PowerShell Script to Limit SharePoint Site Templates Available

Restricting Usage of Site Templates in SharePoint


SharePoint Site Collections enable restriction of site templates and page layouts via a simple modification on site settings in the browser. Go to the site settings of a single site or the site collection main site (Site Actions > Site Settings > Modify All Site Settings) and choose Look and Feel -ryhmästä Page layouts and site templates.

This setting can be modied in Publishing Sites or wss-sites with publishing features activated (these features can be activated in site settings:: Site Actions > Site Settings > Site Features, Office SharePoint Server Publishing > Activate, note that this setting is not inherited by subsites).

On the Page layouts and site templates page the usage of site templates and page layouts can be set in three different ways:



http://2.bp.blogspot.com/_tXx3AYB9E-M/SL5mfK2RWYI/AAAAAAAAACA/rLWLxHioibQ/s1600/sitetemp1.png

  1. Set subsites to inherit templates or layouts from parent site (the site where the setting is modified)
  2. Give the subsites permission to use any templates or layouts
  3. Give the subsites permission to use only specifically determined templates or layouts
Subsites can be reset to inherit these settings by selecting Reset all subsites to inherit… The setting is inherited by existing publishing and wss sites and new publishing sites, but not new wss sites.
If this seems insufficient, one can always take up more severe measures in restricting usage of Site templates and page layouts.
Page layouts aren't a problem, really, since by spcifying the permitted page layouts in the settings of the site collection and inheriting the settings to subsites, the setting really goes all the way through the site collection. And if you want to, you can always manage them further in the Master Page and page layout gallery (in site collection settings Site Actions > Site Settings ja Galleries > Master pages and page layouts) and delete (or move to another location) the page layouts that are not to be used at all:

Site templates, on the other hand, require the tampering of a set of XML files - those of customized Site Definitions (if there are such) and those managing the templates of the whole Web Application.
On the SharePoint server, the \Program Files\Common Files\Microsoft Shared\web server extensions\12\TEMPLATE\1033\XML directory contains these XML files to modify. Of these, the WEBTEMP.XML file is the one containing settings for site templates, except for the Publishing and Enterpise tabs. Templates can be hidden from view & thus from usage by setting the value of the attribute Hidden to be "TRUE" on those templates you wish to hide.

This is actually the only supported action in these XML files - and even this is an exception (More about Microsoft Supported ja unsupported scenarios on the Microsoft site: http://support.microsoft.com/default.aspx/kb/898631 ).
Hiding templates on the Publishing tab is done similiarly in the webtempsps.xml file. The Enterprise tab is a tad more complex thing to modify, as each template has its own XML file, but they are all situated in the same XML directory with these already mentioned files.
Own tabs can be created - or the existing ones "renaimed" (but as a reminder, this is not officially supported) by setting the value of the DisplayCategory attribute: DisplayCategory="Own tab name" in the XML files.

After this, one question remains: how to make the site templates saved in the browser (in the site settings of a wss site Look and Feel > Save site as template) to appear on a tab not named Custom?
The name of the Custom tab can be changed by modifying the value of TemplatePickerControl_Custom in the \Program Files\Common Files\Microsoft Shared\web server extensions\12\Resources\core.[en-US].resx file:

Remember to make backups before tampering with the original files! And after modifying the files, be sure to perform iisreset in order to apply the changes.





Reference:

http://borderingdotnet.blogspot.in/2008/09/restricting-usage-of-site-templates-in.html

SharePoint 2010 Delegated Administration

Have been wanting to try this for a while now and just now got some time to do it today.  The Central Administration site is just a SharePoint site with libraries and links, so I was curious what would happen if you were added to the site as a simple reader.  Here's the results:
As a reader and contributor, you do not gain access to Central administration and you will get the access denied error message.  The real magic comes in being in a specifically names group, there are two groups in the SCA:
  • Farm Administrators
  • Delegated Administrators
Full Control, Contributor and Read permission levels have no role to play in the links on the SCA.  What does matter is what group you reside in.  Being a Farm Administrator allows you to do anything in the SCA.  Being a Delegated lets you do a subset of actions, one of the items you cannot do is to create new Web Applications, but when it comes to the majority of other things, you can do them!  The thing that I would be more insterested in how one would target the links in Quick Launch to specific people.  IE, something like the following:
  • Web Application manager
  • Service Account Manager
  • Service Application Manager (like a global service app manager role rather than manually apply to each one)
  • Backup Restore Manager
  • Content Deployment Manager
Service applications have a completed different architecture to them.  Each service application can have an "Administrator" assigned to it.  I found a great article that describes this process here:
http://www.sharepointanalysthq.com/2010/10/creating-a-delegated-administrator-for-a-service-application/
However, this also doesn't have much in terms of granular controls.  Its all or nothing for most of them.  These need more granular controls setup for them.  Security seems to be an afterthought in SharePoint, has been, probably always will be.

Reference:

http://blogs.architectingconnectedsystems.com/blogs/cjg/archive/2010/12/06/SharePoint-2010-Delegated-Administration.aspx

Creating a delegated administrator for a service application

One awesome thing about Service Apps in SharePoint 2010 is not only that you can have more than one of them for a particular service (for example HR and Marketing having their own Managed Metadata Service) but you can give users permissions to manage these Service Applications in Central Administration without giving them access to the whole kit and kaboodle.
This is the concept of a ‘Delegated Administrator’. A user who we want to manage a particular service application but we don’t want them to be able to see anything else. Obviously this is really useful to the SharePoint administrator because it means less work for us Smile
So lets assume that we have a Managed Metadata Service Application that we want our non admin user, John Smith, to be able to manage. This way we can let John be an administrator just for the Managed Metadata Service without needing to expose all the other functionality.
So firstly we need to get to the Manage Service Applications screen by click on the ‘Manage Service Applications’ link from the home page of Central Admin

image

Then click to the right of whichever Service Application you want to create an Administrator for and select the Administrator button ( Don’t actually click on the text, but just highlight the row):

http://www.sharepointanalysthq.com/wp-content/uploads/2010/09/image2.png


Add in our username, give them full permissions and click ok.

http://www.sharepointanalysthq.com/wp-content/uploads/2010/09/image9.png



 Now if we log in as John we can see that we are within Central Administration but a whole lot is missing, in fact the only thing that we can see is the Service Application that we have access to.


 http://www.sharepointanalysthq.com/wp-content/uploads/2010/09/image10.png


 One more thing to remember is that if you remove a user from administering a Service Application they will still have access to Central Administration, all be it with nothing to see. If you want to completly remove all access for a user you will have to remove them from the delegated administrators group as well.


 http://www.sharepointanalysthq.com/wp-content/uploads/2010/09/image11.png


 So there you go a quick and easy way to allow your users to manage the Service Application that they need to without necessarily giving them access to the rest of Central Administration.




Reference:

http://www.sharepointanalysthq.com/2010/10/creating-a-delegated-administrator-for-a-service-application/

Using Quota Template to manage site collection storage limits (Power Shell, SharePoint 2010)


In this article I am showing you how to set limit for SharePoint 2010 site collection using Quota Template. Here I am using Power Shell to define Quota Template.

A quota Templates defines the storage limit for the maximum amount of data that can be stored in a site collection.

When the site collection reaches the Quota template defined by Administrato, it triggers an e-mail alert to the site collection administrator. Quotas can be saved as quota templates so that we can apply them to any site collection in a SharePoint farm.

Create Quota Template

1. On the Start menu, click All Programs.

2. Click Microsoft SharePoint 2010 Products.

3. Click SharePoint 2010 Management Shell.

4. At the Windows Power Shell command prompt type the following command:

pic1.gif

5. You will get a Power shell command prompt like below

pic2.gif

The Syntax to create Quota Template is as shown

$Customquota = New-Object Microsoft.SharePoint.Administration.SPQuotaTemplate
$Customquota.Name = "ProjectQuota"
$Customquota.StorageMaximumLevel = 1048576
$Customquota.StorageWarningLevel = 524288
$Service = [Microsoft.SharePoint.Administration.SPWebService]::ContentService
$Service.QuotaTemplates.Add($Customquota)
$Service.Update()

  • Name - You have to give the Quota Template name as string value.
  • StorageMaximumLevel –Is the maximum size for your site collection(In Bytes).
  • StorageWarningLevel-Will give email message if the Quota template reaches the value specified in this column(In Bytes)
Please find the command in action
pic3.gif

To change the quota template for a site collection by using Windows Power Shell.

The Syntax Change the Quota Template for a site collection.

Set-SPSite -Identity "Site URL" -QuotaTemplate "Template Name"

  • Site URL- is the URL of the site collection whose quota template you want to change.
  • Template Name -is the name or GUID of the replacement template. 

Reference:

http://www.c-sharpcorner.com/uploadfile/Roji.Joy/using-quota-template-to-manage-site-collection-storage-limits-power-shell-sharepoint-2010/

Using Quota Template to manage site collection storage limits through Central Administration


In this article I showing you how t o create a managed path using SharePoint Central Administration.

Create Quota Template

1. In Central Administration click Application Management TAB.

1.gif

2. From Application Management page, click Specify Quota templates from Site Collection 

2.gif 

3. Select Create new quota template option

4. Give the Name for the new Quota.

5. Set Maximum storage limit and warning message limit and click ok

3.gif
 
Set Quota Template to Site Collection

1. From Application Management page, click Configure quotas and locks from Site Collection 

4.gif

2. Select the Quota that we just created. Please make sure you have selected your site collection from the First drop down (Site Collection section)

5.gif
 
3. I have selected the Quota Template that we just created and clicked OK

6.gif
 
You have done with attaching a site collection to the quota template.
 
 
 
Reference:
 
 

Policy for Web Application


Learning from my own mistakes, I wanted to share the following bit about defining security policies for a web application using Central Admin. If you open up the Application Management you see the following section :

Now there is a 'no-touchy' link and 'yes, please touch me link'. The 'no-touchy' link is the 'User permissions for Web Application" link, when you touch and uncheck some options like 'Manage Web Site'. You will experience strange behavior and errors described in some previous posts Self-Service Site Creation and permissions and Permissions and workflow.
Best practice is to leave that thing alone and define your own 'user-permissions for Web Application' using the 'yes, please touch me link' ;)

Once there, click on the "Manage Permissions Policy Levels" (on the left)

Click on "Add Permission Policy level", then you see an overview all the permissions (like in "User Permisisions for web application" link) and you can deny of grant the permissions according to the requirements that you have.

So give it a proper name and description, check the permissions you want to give and click on OK. Next step is to add a group of users (in my case ALL the users) to use that permission level. Click on "Add Users", click Next (you can apply the custom policy to zones here (for example an internet zone on the same webapplication has different permissions that the intranet zone))

Type in the Groupname (or just particular users), check your custom permission level and click on Finish et voila. You've assigned all the users to make use of your custom permission level. Thereby letting all the service accounts use their own permissions levels.

Reference:

http://glorix.blogspot.in/2007/10/policy-for-web-application.html


SharePoint Security 101: What You Need to Know to Secure SharePoint

For most organizations, a healthy security stance is essential to protecting and preserving Microsoft SharePoint content. Depending on your industry, you might even be bound by regulations that require you to secure and audit access to some content.
Certainly, security is a broad topic that involves not only SharePoint farm administrators, but server, network, and database admins as well. Through delegation to site collection admins and site owners in the business units, security also involves day-to-day end users.
To effectively enforce business-driven information-management policies, collaboration with the business is also necessary.
In response to the vast number of interested security stakeholders, SharePoint 2010 offers a flexible security model that supports multiple authentication types and multiple levels of permission authorization.
But this flexibility has a downside: Without a clear, published strategy for how permission management should be performed in your organization, security chaos can make day-to-day usage quite painful.
With all these variables, it's no wonder that security can become a complex equation.
Rest assured that armed with a clear understanding of your security requirements, some technical guidance, and bit of common sense, you can build a security model that is both effective and sustainable.
In this three-part series, we aim to provide you with this technical guidance -- and we'll throw in some best practices for good measure.
In this article, I'll start off with the basics, provide you with several step-by-step procedures, and make sure that you have a good overall understanding of the SharePoint authorization model. The focus will be on the farm and work through web applications and site collections, down to individual sites, lists, libraries, and items. In Part 2, Kevin Laahs will focus on claims-based authentication; in Part 3, Todd Klindt will talk about hardening your SharePoint servers.

SharePoint's Logical Hierarchy

Before we get into setting permissions, let's review the basic terminology of a SharePoint environment. A SharePoint farm refers to all the servers (i.e., web front end, application servers, and database servers) that work together to provide a SharePoint service to users. Within the farm, a structured hierarchy organizes content, as Figure 1 shows. The purpose of this hierarchy is to organize and secure the vast amount of content within SharePoint.
 
Figure 1: SharePoints logical hierarchy

Figure 1: SharePoint's logical hierarchy

Securing the Farm

Despite the enormous responsibility that it implicates, securing the farm is quite a simple process. Permissions are mostly cut and dried: You're either a farm admin, or you aren't. A farm admin has full control over the farm, including managing web applications, starting and stopping services, backing up or restoring the farm -- effectively, any task that can be found in Central Administration, SharePoint's web-based administration interface. A farm administrator can also grant anyone access to any and all content within SharePoint. Indeed, the farm admin role is a powerful one, and you should be cautious about who is granted this level of access.
Farm administrator access is granted by adding Active Directory (AD) users or security groups to the farm administrators group within Central Administration:
1. Within Central Administration, click Security and then select Manage The Farm Administrators Group.
2. Add or remove AD users or groups as needed.
Security note: To perform certain administrative tasks such as creating web applications, you also need to be a local Windows administrator on the web server (or servers) that run the Central Administration web application.

Granting PowerShell Access

Although Central Administration is commonly used for many day-to-day operations, Windows PowerShell is an incredibly powerful way to administer and automate SharePoint functions from a command-line interface. (To learn more about using PowerShell with SharePoint, see " Using Windows PowerShell to Manage SharePoint 2010 " and " SharePoint Administrators Can Learn to Love PowerShell .")
To grant permissions for others to run PowerShell commands, use the Add-SPShellAdmin cmdlet. This command grants necessary permissions on SharePoint servers, the configuration database, and (optionally) a SharePoint content database. If you run this command without specifying a database, then the user is granted access to the farm only, not to any content databases. To grant a user the ability to run all cmdlets within a content database (e.g., to use Get-SPWeb to return a site), use the -database switch to grant the user access to the content database.
Security note: To use the Add-SPShellAdmin cmdlet to grant PowerShell access, you must be a farm administrator, a local administrator on the server on which the command is run, and a security admin on the database server (or servers) to which you are granting permission.

Securing a Web Application

A web application is a user's entry point into SharePoint. Specifically, a web application consists of one or more Microsoft Internet Information Server (IIS) websites that control how users are authenticated (or not authenticated, if you allow anonymous access). Organizations commonly have multiple web applications to isolate certain types of content or sets of users, such as a Record Center or extranet, respectively. When granting permissions to a web application, the sole purpose is to control who has access to the content within the site collections that are associated with the web application. In other words, you cannot grant permissions to administer a web application; only farm admins can do that, and they have administrative control over all web applications.
To adjust permissions to content within a web application, change the user policy for the web application. You can make this change in Central Administration:
1. Within Central Administration, click Application Management.
2. Select Manage Web Applications.
3. Highlight the web application and click the User Policy button in the Ribbon.
4. Add or deny permissions, as needed.
Security Note: Because permissions can also be set for individual site collections (which I cover in the next section), permissions aren't usually granted this way. This method is very powerful and is used for special purposes. For example, you might decide to use it to grant read-only access to auditors, to ensure that they have access to all site collections in the web application. Furthermore, this web application policy is the only method for denying someone access to SharePoint. This setting takes precedence over any other permission that is granted. Also, none of the permissions that you grant here are visible at a lower level. For example, a site collection administrator can't see who has been granted permissions through the web application policy. Again, this method of setting permissions is powerful but potentially confusing and dangerous -- so use it with caution!

Allowing Anonymous Access

Anonymous access allows non-authenticated (i.e., guest) users to access a SharePoint web application. Anonymous access is commonly used for Internet-facing sites but can also be used for intranets. Anonymous access can be enabled whether you use claims or classic authentication. Here's how you enable anonymous access:
1. Within Central Administration, click Application Management.
2. Select Manage Web Applications.
3. Highlight the web application and click the Authentication Providers button in the Ribbon.
4. Select the zone. (A zone allows you to expose a web application with a unique URL. You can have as many as five zones per web application. All zones have access to the content databases and site collections that are associated with that web application.)
5. Select the Enable Anonymous Access check box and click Save.
Security note: By default, anonymous users have no access to site collections until that permission is granted. Therefore, after anonymous access has been enabled, you must set which permissions anonymous users have. (I cover this topic in the Grant Anonymous Access section of this article.)

Securing a Site Collection

Although you can grant permissions to multiple site collections through the web application policy, save this method for special circumstances. Users are authenticated at the web application level and authorization is typically performed at the site collection level. In other words, for regular, day-to-day permission management, you should assign permissions via site collections.
By default, permissions are inherited or cascade down to all websites, lists, libraries, folders, and items in the site collection hierarchy. Thus, permissions that are granted to the top-level site also apply to a document buried deep within a site collection. As you'll learn, this inheritance can be stopped.
The highest level of access within a site collection belongs to the site collection administrator. This user has implicit access to all SharePoint content (e.g., sites, lists, libraries, items) within the site collection, whether or not permission is specifically granted. Through Central Administration, a farm admin can specify up to two site collection administrators for each site collection. Within each site collection, however, a site collection administrator can add additional admins as needed.
You grant regular users (i.e., non-administrators) access through the site collection. In fact, each site collection is administered separately, making these collections very convenient administrative units that can be delegated out. Because administration occurs from within the site collection (and not Central Administration), administrative tasks are often assigned to trained business users, empowering them to be somewhat self-supporting. Of course, depending on your site collection architecture, this administrative boundary can become a challenge. For example, if you need to grant access to multiple site collections, that access must be granted one collection at a time for each user or group of users.
Security Note: If a user tries to access a site to which they don't have permissions, of course they get an access denied error. But you can have the user request access from this error page. To learn more, see " How to Manage SharePoint Site Access Requests."

Understanding SharePoint Groups

Like many other systems, SharePoint uses the notion of groups to simplify the assignment of permissions to multiple users. Note that SharePoint groups are specific to a site collection. Thus, you cannot use one SharePoint group to span multiple site collections. Again, this can be a blessing (when you want administrative separation) or a curse (when you don't). Also, SharePoint groups can't be nested, meaning that you can't place one SharePoint group within another. Some of these limitations don't apply to AD security groups, however. For example, you can assign one AD group permissions to multiple site collections. To better understand your options, here are the different ways permissions within a site collection can be granted:
  • Add one or more users to a SharePoint group and grant that group permissions.
  • Add one or more users to an AD security group and grant that group permissions.
  • Add one or more users to an AD security group, add the AD group to a SharePoint group (this type of nesting is allowed), and grant the SharePoint group permissions.
  • Grant permissions directly to one or more users, without using groups.
You assign permissions to users or groups by granting permission levels. Each site collection has its own built-in set of permission levels; you might be familiar with some of them (e.g., Full Control, Design, Contribute, Read). You can also create custom permission levels for more granular control over the granted access. Here are the steps to grant permissions within a site collection:
1. Within the site collection, go to the Site Actions menu and select Site Permissions.
2. On the Ribbon, click the Grant Permissions button.
3. In the dialog box, select individual users, SharePoint groups, or AD security groups.
4. Specify whether you want to add these users to a SharePoint group or to grant permissions directly. (Note: If you selected one or more SharePoint groups in step 3, you can only grant permissions directly.)
5. Optionally, send these users a welcome email.
When creating a new SharePoint group, you can also assign permissions to the group. Doing so makes permission assignment easy because you need only add users into the group. You can create new SharePoint groups from the same Site Permission screen on which you grant permissions.
Security note: When creating a new site collection, three default SharePoint groups are created automatically: owners (who have Full Control access), members (who have Contribute access), and visitors (who have Read-Only access).

Permission Inheritance

By default, permissions that are set for the top-level site within a site collection apply to all content in the site collection hierarchy (as Figure 1 shows). This concept is called permission inheritance and it helps to simplify permission management.
You can no doubt think of cases in which you need to establish unique permissions for a certain level. For example, you might want to protect a subsite and ensure that only managers have access. Within SharePoint, you can stop this permission inheritance on four different objects within the site collection: sites, lists/libraries, folders, and items. When you stop inheriting permissions, you can establish a unique ACL for that object, which then cascades to lower levels. This gives you a great deal of flexibility to mold a specific set of permissions around your content. However, be careful: The more you stop inheritance, the more complex permission management becomes over time. Another troublesome side effect of stopping inheritance too often is that it can drastically affect SharePoint's performance. As a general rule, stopping inheritance should be the exception, and you are encouraged to structure your sites, libraries, and folders accordingly. Figure 2 depicts an example of permission inheritance.

Figure 2: Permission inheritance in action

Figure 2: Permission inheritance in action  The basic steps to stop inheritance and assign permissions are the same, regardless of the object type. For a site, use the Site Permissions link in the Site Actions menu. For a list or library, use the list's or library's settings page. For a folder or item, use the object's context menu, sometimes called the edit control block. If inheritance is stopped on an object, you can revert back to inherit, but any custom permissions that you applied will be lost.
Security note: Despite your best efforts, permission management can still spiral out of control. Another way to alleviate this is to have a good governance plan that gives administrative end users clear guidance about how to use groups and when or if to stop inheritance. Another option is to use third-party software such as AvePoint's DocAve Administrator, which can help manage permissions across the whole farm in one operation. Tools like this also help enforce a security policy as defined in a governance plan.

Granting Anonymous Access

If the web application is configured to allow anonymous access, you can adjust which permissions an anonymous user receives:
1. Access the permissions page for the object, as described in the previous section.
2. If necessary, click the Stop Inheriting Permissions button in the Ribbon. (You can't adjust anonymous access on an object that inherits permissions from its parent.)
3. In the Ribbon, click the Anonymous Access button.
4. Choose the permissions to grant to anonymous users. The available permissions will vary depending on the type of object.
5. Click OK to save.

Wrapping Up

Hopefully, this security overview wasn't too painful and served as a useful refresher for those who have a SharePoint background. By now, you should understand SharePoint's authorization capabilities and some of its limitations. You've learned how to define farm and PowerShell administrators, adjust a web application's user policy, and configure each of the four permissionable objects (i.e., site, list/library, folder, and item) within a site collection. I've also given you some quick steps to enable anonymous access and set anonymous permissions. In the next article of this series, Kevin Laahs will focus on authentication, specifically the claims-based authentication support in SharePoint 2010. Until then, be safe and secure.

Reference:

http://sharepointpromag.com/sharepoint-2010/sharepoint-security-101-what-you-need-know-secure-sharepoint

Permissions in SharePoint 2010

Farm Administrators

Farm Administrators group is a group that is managed centrally via SharePoint Central Administration web-site:

Farm Administrators include by default SharePoint Farm -account, SharePoint installation account and BUILTIN\Administrators group. Farm Administrators have basically “all rights” in SharePoint Farm.
You can give Farm Administration rights to groups and users:


Authentication Providers

With authentication providers you can control how you would like to have your users authenticated in a web application. You can also enable/disable anonymous access:

Web Application Level Permission Policies

With web application level permission policies you can control centrally, with Central Administration, what kind of permission policies you want to apply to all site collections and sites under specific web application. SharePoint gives us four predefined policies by default:


Web Application Level User Policies

User Policy is the place where the magic happens in a web application level. User policy is basically a AD user or AD group mapping to certain Web Application Level Permission policy. You can even define a Zone in which the policy is applied. For example you can use different policy for users who use the SharePoint sites from your internal network (intranet zone), and different policy for those who access the sites through public internet (internet zone), or just apply to “All Zones”.

Web Application Level Anonymous Policy

You can also define web application level anonymous users’ policy through Central Administration -site (you can only select the policy from a three predefined policies):

Web Application Level User Permissions

This is just a checkbox list from where you can manage what kind of permission levels can be used in a web application and site collections, you can add/reduce certain permission for the whole web application:

Site Collection Administrators

Site Collection Administrators have full control of a specific SharePoint site collection. You can only use AD users as site collection administrators. With Central Administration site, you can define two users as site collection administrators, but in site collection settings you can add more site collection administrators. Here is a screenshot of Central Administration site collection administrators settings page:


Anonymous Access Permissions

You can control what parts of your site the Anonymous users can access with Anonymous Access Setting:

Anonymous access can further be restricted by enabling View Form Pages Lock Down -feature. Our advice is to enable this feature in every public SharePoint site.
If anonymous access is enabled, you can control the permission of anonymous in list or library:

Site Collection Level Permission Levels

Like in Web Application level permission policies, these are the actual permissions that SharePoint will check when user accesses resources in a SharePoint site. This time we have Grant only abilities (in Web Application Level Permission Policies you could use Grant and Deny). In itself permission levels are only definitions that group the more fine grained permissions together in a more useful entity.
SharePoint has these permission levels defined in site collections:

You can also define your own permission levels, if predefined levels do not match the requirements. Own permission levels can be created in similar fashion as web application level permission policies:

SharePoint Groups

SharePoint groups are a little bit like AD groups, but these groups are managed in SharePoint instead of AD. SharePoint groups can be used to delegate rights management for the site owners instead of system administrators. SharePoint groups are global to the whole site collection. You cannot specify SharePoint group that exists only in a site level. SharePoint groups cannot be used over the site collections. One thing SharePoint groups do support that AD groups do not, is membership requests. You can control SharePoint groups’ permission levels whenever you want to use that group. Basically SharePoint group is just a collection of AD groups and AD users with attached permission levels. While permission level can change for the group the members are globally defined.
Here is a small clipping of Group creation settings:

SharePoint Groups do not directly give any rights to AD users or AD groups. You have to use that group somewhere. Next we walk through all the places where you can use SharePoint Groups, AD Groups and AD users to actually give the permissions.

Site Permissions



Site permissions are where all the permission management begins. More specifically the root site permissions. These are the permissions that all sub-items (except column permission)will inherit. That’s why it is important to carefully design the site permissions as the whole site will use these by default unless the inheritance chain is broken.
When you grant site permissions you can use AD groups, AD users and SharePoint groups. You can either add users to some of SharePoint groups or grant the permissions directly.
Here is a screenshot of SharePoint site level permission granting screen (this exact same functionality is also used in other levels described below):

Each sub site can break the permissions inheritance chain and specify their own permissions, just like you specify them in a root site.

Library or List Permissions



Library and List permissions can be managed though list settings. Basically the management works exactly the same as with Site permissions. First you break the inheritance chain and then you start to manage individual list’s or library’s permissions. You can grant rights for AD users, AD groups and SharePoint Groups. By default libraries and lists inherit their permissions from parent site.
With lists and libraries you have also some other security related features.
For example you can control Draft Item Security:


Folder, Document or Item Permissions

Like with library and site permissions, folders, documents or items can be granted with their own permissions by breaking the permissions inheritance chain.
You can access document and item level permission settings page directly from the object you are interested in:

Column Permissions

In SharePoint, this level of permissions does not exist. But the new permission control for SharePoint has been provided by BoostSolutions, so you can assign different permissions to different users for different columns.
After install Column Permission product on SharePoint, you can access column permission settings page in List Settings page to assign the different permissions for columns.


Reference:

http://www.boostsolutions.com/blog/permissions-in-sharepoint-2010/
 

Enable Anonymous Access in SharePoint 2010


Here are 8 simple steps on how to set up anonymous access in MS SharePoint 2010. It is not much different then SharePoint 2007 set up, the only difference is the GUI or the Ribbon.

1. Starting in Central Administration, under Application Management, click on the Manage web applications.

Anonymous Access Set Up Step 1
2. Make sure you select the site you want to enable anonymous access and click on the Authentication Providers icon.
Anonymous Access Set Up Step 2
3. On the Authentication Providers pop-up window click on the Default zone.
Anonymous Access Set Up Step 3
4. Under Edit Authentication, check Enable anonymous access and click Save.
Anonymous Access Set Up Step 4
5. Going back to Web Application Management click on the Anonymous Policy icon.
Anonymous Access Set Up Step 5
6. Under Anonymous Access Restrictions select your Zone and set the Permissions to None – No policy and click Save.
Anonymous Access Set Up Step 6
7. Now, web application will allow anonymous access to be set. So, navigate to your top level site collection for the web application. Click the Site Actions > Site Settings. Under Users and Permissions click Site permissions.
Anonymous Access Set Up Step 7
8. Under Permission Tools, click Anonymous Access icon and set the permissions to Entire Web site and click OK.
Anonymous Access Set Up Step 8
Anonymous Access Set Up Step 8
Anonymous Access Set Up
That’s all, folks! If you followed these steps properly you should have now Anonymous Access enabled.

Reference:

http://www.topsharepoint.com/enable-anonymous-access-in-sharepoint-2010