There are different logical paths, and zones represent them for gaining access to the same sites within a given web application. Each of these web applications may have up to 5 zones. As you create a web application, one of the zones will be named default by Central Administration (WCAM). You can create the additional zones by extending the web application. Then you can select any of the zone names that remain. They include:
The plan you have in place for the different zones depends on:
- Classic Mode This isn’t recommended, and you can only implement 1 type of authentication in each zone. It is important to know that this option only supports Windows authentication methods.
- Claims Based Authentication This is recommended and you can implement several providers on one zone. You do have the option of using many zones if you like.
When you use claims based authentication for more than one method per zone, it is recommended that you do so on the default zone. This will result in the same URL for all users. When you decide to implement many authentication methods on the same zone, you will encounter the following restrictions:
- Only 1 instance of forms based authentication can be placed in a zone.
- For multiple SAML token based authentication, providers are configured for the farm. All of them appear as options when you create a web application or a new zone. You can configure all of them on the same zone.
It is possible for users from various directory stores to use the same URL in order to access a partner website.
NTLM is required for the crawl component to be able to successfully access content. There must be at least 1 zone that is configured to use NTLM authentication. If it isn’t configured in the default zone, the crawl component will be able to use another zone that is configured to do so.
In order to successfully implement more than 1 zone for web applications you need to:
- Use the default zone to implement your secure authentication settings. A request won’t be able to be associated with a specific zone unless the settings and security of the default zone are applied. This is the zone that was created when you made the web application. The most secure authentication settings are created for end user access, so they will be able to access the default zone.
- Use the minimum number of zones that are required in order to provide users access. Each of the zones is associated with a new IIS site and domain. They allow the web application to be accessed. Don’t add new access points until they are required.
- Make sure at least 1 of the zones is configured to use NTLM authentication for the crawl component. Don’t create dedicated zones for the index component unless you must.
The default zone can be used for remote employees as each zone offers a different URL. You can assign employees to different zones based on if they work in-house for you or externally. With server to server authentication, the servers are able to authenticate based on requests for resources from one to the other for the users. Servers that are able to run SharePoint 2013 or other software that supports Microsoft protocols offer a new set of functions that can be accessed through cross server resource sharing.
In order to provide the right resources from one server to the next, there is a server to server authentication. The server that runs SharePoint 2013 has to be able to:
- Verify the requested server is trusted. This requires you to configure the server so that it runs SharePoint 2013 to trust the server sending requests. This is a one way trust relationship.
- Verify that the type of access the sever is requesting is authorized. You must configure the sever that runs SharePoint 2013 for the right set of permissions for the requested resources.
The server to server authentication protocol in SharePoint 2013 is separated from the user authentication. It isn’t used as a sign in authentication protocol by SharePoint users. The server-to-server authentication protocol uses the Open Authorization 2.0 Protocol (OAuth). It doesn’t add to the set of user sign on protocols such as WS Federation. There aren’t any new user authentication protocols found in SharePoint 2013. The server to server authentication doesn’t appear in the list of identity providers.