Sharepoint 2007 匿名账户提升权限修改列表

在进行SharePoint编程时,有时需要修改List中的某一个Item,但是当前的登录用户没有权限对该List修改,那么在编程时一般可以通过两种方式来进行,下面就是这两种方法的介绍:

Impersonation in SharePoint 2007

 

SharePoint security model makes it easy to programmatically execute code within the current user context.

Just write and deploy web part / event handler code and it runs in the security context of the logged in user. There are even built-in functions that take advantage of the user's security context - such as GetSubwebsForCurrentUser() - without requiring any extra coding on our part which is simple yet effective security mechanism.

But there are situations when the code needs to be executed with permissions greater than that of the current user (like instantiating a site collection or enumerating list permissions or reading a lookup / configuration list on which user may not have access rights).

In such situations, the code needs to be executed with elevated permission level or under the context of user with higher permissions i.e. Impersonation.

So here are the two approaches for u ----

方法一 Executing code as another named user

Process

When we create a SharePoint site programmatically using the Microsoft.SharePoint namespace, we can supply a user token which enables you to create objects in the context of a specific user. You can impersonate a user by supplying the user token for that user, obtained from the Microsoft.SharePoint.SPUser object. The user token, SPUserToken, is a binary object that contains the identification and domain group membership of a user.

This allows you to use the Microsoft.SharePoint.SPSite constructor to instantiate a site collection object that runs as if that user was making changes.

SPSite site = new SPSite("SiteCollection_Url");

SPWeb web = site.OpenWeb();

SPUser user = web.AllUsers["User_Name"];    // User_Name一般可以使用 SHAREPOINT/system

SPUserToken token = user.UserToken;

SPSite impersonatedSiteCollection = new SPSite("SiteCollection_Url", token);

 

(........ 修改前使用web.AllowUnsafeUpdates = true; 修改结束之后在赋值为false

注意此时的用户已经是SHAREPOINT/system,而不是当前登录用户,可以调用web.CurrentUser查看

)

 

Any objects (SPWeb, SPList, etc) that you create from this impersonated site collection will execute as the impersonated user.

Where to Use -

This Approach is useful to run any code which requires specific permissions to execute that code (like permission for reading a particular list), rather than having a full control access permission.

In such a case, service account can be created by specific access rights just sufficient enough to execute the code.

Caution-

Although impersonation provides a powerful new technique for managing security, it should be used with care to make sure that unwanted activity is not performed by users who shouldn't have the ability to impersonate.

 

 

 

方法二 Executing code with elevated privileges

Process

Method 1 -

Elevation of privilege is a new feature of that enables you to programmatically perform actions in code using an increased level of privilege. The Microsoft.SharePoint.SPSecurity.RunWithElevatedPrivileges method enables you to supply a delegate that runs a subset of code in the context of an account with higher privileges than the current user.

For example:

1. Define a public method that acts simply as a front end to the method that does the "real" work.

public void ProcessMethod()

{

SPSecurity.CodeToRunElevated elevatedMethod = new SPSecurity.CodeToRunElevated( ProcessMethodAsElevated);

SPSecurity.RunWithElevatedPrivileges(elevatedMethod);

}

The code uses a method from SPSecurity to indicate the name of the method that will run with Full Control(Basically using Application Pool Account).

In the first line, simply pass in the name of the method as the parameter. In the second line, you execute that method with elevated privileges.

2. Now create the method that does the real work. It is called by the first method (delegate), but executes with Full Control(under Application Pool Account):

private void ProcessMethodAsElevated()

{

//code goes here to do our work

}

Method 2 -

We can also implement this method by creating dummy delegate method within a code.

SPSecurity.RunWithElevatedPrivileges(

                        delegate()

                        {

                                    //code goes here to do our work

                           

                        });

 

Where to Use -

This approach can be used in scenarios to read or update Site Collection, Site related objects using Full control in event handlers, features or web parts (i.e. code being executed under SharePoint Context.

Caution-

In this approach, we can't use any SharePoint objects that were created outside the method or else the impersonation won't work.

We also can't use anything like SPControl.GetContextWeb(Context) because that also blows the impersonation out of the water.

Instead, we can tweak it like SPSite site = new SPSite(SPControl.GetContextSite(Context).ID). (注意使用new SPSite, 并使用using 以便使用完毕后销毁)In this case, we are instantiating a new SPSite object and only using the GUID of the current site. i.e. recreation of the SPSite object with new permissions.

Also, we should dispose of the SPSite object created within the RunWithElevatedPrivileges() before exiting the scope, because that SPSite will still have the SHAREPOINT/system identity even outside of the RunWithElevatedPrivileges() scope.

RunWithElevatedPrivileges() has no effect when running in a standalone exe.

 

  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
提供的源码资源涵盖了Java应用等多个领域,每个领域都包含了丰富的实例和项目。这些源码都是基于各自平台的最新技术和标准编写,确保了在对应环境下能够无缝运行。同时,源码中配备了详细的注释和文档,帮助用户快速理解代码结构和实现逻辑。 适用人群: 适合毕业设计、课程设计作业。这些源码资源特别适合大学生群体。无论你是计算机相关专业的学生,还是对其他领域编程感兴趣的学生,这些资源都能为你提供宝贵的学习和实践机会。通过学习和运行这些源码,你可以掌握各平台开发的基础知识,提升编程能力和项目实战经验。 使用场景及目标: 在学习阶段,你可以利用这些源码资源进行课程实践、课外项目或毕业设计。通过分析和运行源码,你将深入了解各平台开发的技术细节和最佳实践,逐步培养起自己的项目开发和问题解决能力。此外,在求职或创业过程中,具备跨平台开发能力的大学生将更具竞争力。 其他说明: 为了确保源码资源的可运行性和易用性,特别注意了以下几点:首先,每份源码都提供了详细的运行环境和依赖说明,确保用户能够轻松搭建起开发环境;其次,源码中的注释和文档都非常完善,方便用户快速上手和理解代码;最后,我会定期更新这些源码资源,以适应各平台技术的最新发展和市场需求。 所有源码均经过严格测试,可以直接运行,可以放心下载使用。有任何使用问题欢迎随时与博主沟通,第一时间进行解答!

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值