Plan for requirements for deploying an EPM/Office SharePoint Server 2007 extranet environment
This Office product will reach end of support on October 10, 2017. To stay supported, you will need to upgrade. For more information, see , Resources to help you upgrade your Office 2007 servers and clients.
Topic Last Modified: 2010-02-24
This article describes planning requirements in an Enterprise Project Management (EPM)/Microsoft Office SharePoint Server 2007 extranet environment. For an overview of this chapter about how to plan for EPM extranets, see Plan an EPM/Office SharePoint Server 2007 extranet environment.
Planning the deployment of an EPM-focused Microsoft Office SharePoint Server 2007 to an extranet includes the following requirements.
The starting point of the deployment is a functioning EPM/Microsoft Office SharePoint Server 2007 intranet environment that lets intranet users access and use all features as allowed by the security model.
The main focus of our extranet scenario is to enable extranet users (partner employees) to access and use a subset of the features opened to the intranet users
The features opened to the extranet users are Office Project Web Access 2007 (timesheet, task status, PWA views), ability to open and edit project plans with Project Professional 2007, ability to collaborate in a selected number of project workspaces, ability to search only within the data that can be accessed by the extranet users.
The extranet users should not be allowed to access any other intranet data or information.
The intranet users should have the same privileges and access when the extranet scenario is in place compared to the intranet features
The extranet users shall be authenticated by Forms to avoid the complexity of setting up an Active Directory environment in the extranet. However this scenario will be tested and validated during the next phase of this project.
Encryption will be required for all communication between servers and users when the servers or data can be accessed by the extranet users. SSL or the Kerberos protocol will be used to support the encryption depending on the context.