Site personnel de Didier Danse
Didier Danse's Personnal Website
Microsoft Most Valuable Professional SharePoint - Development News

March 2009 - Posts

  • SharePoint: How to allow a user to configure Search without granting access to all pages of Central Administration

    Every SharePoint administrator knows what is Central Administration. Developers should also be aware of what is available through this user interface. Depending of what kind of sites (applications) are developed, search scopes and meta data properties mappings must be added. So, who should be able to do this configuration?

    I won’t write about the usual discussion around roles and responsabilities but at the end of this post we will be able to grant access to search settings.

    To be allowed to configure SharePoint Search (scopes, rules, …), Read permission on the concerned Shared Service must be granted to the user that has to do this: http://servername:port/ssp/admin/_layouts/user.aspx.



    Every user (direct reference or group reference) that has Read permission can have the following page:


    As you can see, there is a lot of links on this page. Most of them linked to access denied pages. So, with Read permission granted, we have access to:

    • Trusted My Site host locations
    • Published links to Office client applications
    • Search settings

    First two ones will produce a read-only content. No modifications are allowed.

    In the Quick Lauch, Back to Central Administration and Shared Services Administration pages are also not available without more than Read permission. So the only one that is available is Search Settings (http://servername:port/ssp/admin/_layouts/searchsspsettings.aspx).

    Through this user interface, we are able to manage all search properties.

    Sometimes, 403 error can happen after these operations. Because of this, we should run attrib –s c:\windows\tasks using command line. This command will change System attribute on scheduled tasks folder. Don’t be afraid, we will set the attribute to previous one at the end of the operations.

    After this, right click on c:\Windows\Tasks folder and check if WSS_WPG has Read and Write access on the folder.

    As I wrote before, we will set System attribute to the previous one: attrib +s c:\windows\tasks.

    Check also that WSS_WPG and your fonctional account have some permissions on OSearch component.

  • Internet Explorer 8 is available for download

    Internet Explorer 8 is now final and available for download.


    From a user point of view, there is only a few changes but this new version exposes a lot of new functionnalities. Coming from the most visible functionnalities, there are better performances, better CSS support and a lot of things like suggestions. You can find the complete list of new things here:

    From a developer sight, we are happy to see that a new development tools window is available


    Download Internet Explorer here:

  • How to test web applications with different versions of Internet Explorer

    When we develop applications that are accessible from a web browser, we should check that this application can be accessed and used by most used browsers. So we have to install Firefox, Chrome and all other browser we want to use.

    But how can we test applications with different versions of the same browser? We cannot easily install differents versions of Internet Explorer on the same workstation.

    There is a tool free of charge that allow use of multiple version of Internet Explorer: IETester.

    IETester is a free WebBrowser that allows you to have the rendering and javascript engines of IE8 RC1, IE7 IE 6 and IE5.5 on Vista and XP, as well as the installed IE in the same process.
    New in v0.3 : IE8 RC1, zoom feature and a lot of corrections and improvements !


    Have a good testing session!

  • SharePoint: STSADM –o blockedfilelist doesn’t work?

    You runned

    stsadm –o blockedfilelist –extension .exe –delete

    and received an Operation Successful result. Great! You can now upload .exe files to your SharePoint. You think that you can do this but… SharePoint doesn’t allow this upload. Strange! Operation successfully completed isn’t it?

    In fact, it succeed but didn’t act as expected. You authorized .exe upload file to the Central Administration instance and not your content site.

    To correct this, you just have to add an url parameter and specify your SharePoint instance:

    stsadm –o blockedfilelist –extension .exe –delete –url http://servername
More Posts
L'auteur du site ne peut être tenu responsable des dommages que les informations fournies pourraient entraîner. Tout est cependant mis en oeuvre pour éviter tout désagrément.
Powered by Community Server (Non-Commercial Edition), by Telligent Systems