http://technet.microsoft.com/en-us/library/ee424403.aspx
The corporate managed metadata service is the primary managed metadata service for all SharePoint Server 2010 sites in the company. The corporate taxonomy is represented by global term sets in the term store that is associated with the corporate managed metadata service. The content type hub that is associated with the corporate managed metadata service makes shared content types available to users of all site collections.
Every Web application has a connection to the corporate managed metadata service. The connections from the My Site Web application, the team sites Web application, and the legal sites Web application, numbered 2, 3, and 4 in the figure, all have restricted access to the corporate managed metadata service. Restricted access lets users of the sites in these Web applications use the shared content types and global term sets, add new enterprise keywords, and create local term sets, but it prohibits them from modifying global term sets.
The administrative Web application hosts the site collection from which authorized users manage the corporate taxonomy and the shared content types. The site collection's content type gallery contains the shared content types, such as the updated document content type that reflects the additional required properties. This content type gallery is the content type hub of the corporate managed metadata service. The connection from the administrative Web application, numbered 1 in the figure, has full access to the corporate managed metadata service.
The term store that is associated with the legal department's managed metadata service contains term sets that represent confidential information that the legal department uses. Only the legal sites Web application has a connection to legal's managed metadata service, so that users of the site collections in the legal sites Web application can manage their term sets.
Permissions
The following table summarizes the permission that each
managed metadata service grants to the accounts that the connections use
to access the service. Note that local farm is
explicitly given reduced permission. If you do not remove or reduce the
permissions for local farm, other local accounts will connect to the
services by using the permissions that are specified for local farm.
Account | Corporate managed metadata service | Legal's managed metadata service |
---|---|---|
Local farm |
Read permission |
No permission |
Administrative Web application's application pool account |
Full permission |
No permission |
My Site Web application's application pool account |
Restricted permission |
No permission |
Team sites Web application's application pool account |
Restricted permission |
No permission |
Legal sites Web application's application pool account |
Restricted permission |
Full permission |
Connection parameters
All connections to the corporate managed metadata service specify that the corporate managed metadata service is the default location to store keywords. Because the connection from the legal sites Web application to the corporate managed metadata service is the default keyword location, its connection to legal's managed metadata service is not the default keyword location.The connections from the administrative Web application, the My Site Web application, and the team sites Web application to the corporate managed metadata service specify that the corporate managed metadata service is the place to store column-specific term sets. The connection from the legal Web application to the corporate managed metadata service specifies not to store column-specific term sets. The connection from the legal Web application to the legal managed metadata service specifies that it is the default location for column-specific term sets.
Note: |
---|
Either managed metadata service would be an
acceptable location for column-specific term sets from the legal sites
Web application. Because column-specific term sets are local to the site
collection from which they are created, users of other site collections
cannot see them. |
Security Note: |
---|
Metadata publishing should not be
enabled for any library that contains documents that might have metadata
that other users should not see. Metadata publishing is disabled by
default. For more information about metadata publishing, see Configure Enterprise Metadata and Keyword Settings for a list or library. |
The following table summarizes the connection settings for each connection to a managed metadata service. The connection numbers refer to the lines in the previous figure.
Connection | Managed metadata service | Web application | Default keyword location | Column-specific term set location | Use content types | Push-down content types |
---|---|---|---|---|---|---|
1 |
Corporate managed metadata service |
Administrative Web application |
Yes |
Yes |
Yes |
Yes |
2 |
Corporate managed metadata service |
My Site Web application |
Yes |
Yes |
Yes |
Yes |
3 |
Corporate managed metadata service |
Team sites Web application |
Yes |
Yes |
Yes |
Yes |
4 |
Corporate managed metadata service |
Legal sites Web application |
Yes |
No |
Yes |
Yes |
5 |
Legal's managed metadata service |
Thanks to Ben English :
http://sharepoint.mindsharpblogs.com/Bill/archive/2010/04/02/Organizing-Information-in-SharePoint-Server-2010.aspx
Putability and the Managed Metadata Service
For all of the reasons discussed thus far in this chapter, the Managed Metadata Service (MMS) must be utilized if you're going to significantly improve the findability of information in your environment. It is the only way you'll achieve consistent application of metadata to your data within SharePoint 2010. Once your users are consistently applying metadata to information, they will be able to find information more easily and quickly. The MMS is all about putability in your information architecture.Table 1 provides an outline of how content type syndication and the MMS achieves the metadata needs we've outlined thus far in this chapter.
Metadata Criteria
|
Managed metadata service
|
Notes
|
Discriminatory
|
ü
|
Though the central management of content types, metadata fields can be controlled and applied
Closed choice fields can be promulgated across the enterprise, ensuring that metadata values selected have been vetted as being discriminatory
|
input accurately
|
ü
|
Closed choice fields can ensure that metadata is selected, not input and thus reduce, if not eliminate, misspellings, undefined synonyms or other extraneous data input
|
input consistently
|
ü
|
By setting the metadata fields in the content types to require population, you can ensure that metadata is applied consistently
|
Defined
|
ü
|
Baseline your end-user education about metadata with the glossary that defines the metadata fields and possible values
|
1>The first scenario is about consistency: Is the description of the data (the content type) the same across the enterprise? Do the metadata fields and the values input into those fields contain consistency in both structure and application? When you stop to think about it, content types and metadata are really about consistent governance, management and standardization of information descriptors in the enterprise. In other words, if I build out content type "A" in site collection 1, is it the same construct as when it is used in site collection B? The MMS answers this question in the affirmative and yet provides localized extensibility for greater usability of the content type in specific scenarios.
2>When it comes to the enterprise, is this content contain the same type of data and metadata? Understanding the construction of the content type helps us understand its focus, purpose and meaning.
3>CT HUB : The third scenario is about location: Where is this content type and how can I use it? The MMS will allow you to pull down the content type from the hub and ensure that it is located in your site collection.
4>This scenario encompasses the creation, consumption and disposition of the content type in the enterprise. More specifically, the content type can be mapped to a document's lifecycle and then utilized across the enterprise in distinct ways using the content type's information policies and workflow associations. So, we can use workflows to move the document from one lifecycle stage to the next, ensuring that compliance is enforced, tracked and audited.
Using the content type along with the MMS (mgd metadata service ) helps us in creating a information policy for our org.
Information Architecture (IA) is the art and science of structuring and organizing information systems that support business goals and objectives.All you're doing with an IA is specifying the systems that will hold the data that support the business. Within the IA, a Content Taxonomy (called an Operational Taxonomy in Figure 10-4) will provide the organization of the various types of content, relative to the business needs, user needs, technology support and relationships between the various types of content.
Content Types can be viewed as putability tools whereas search web parts can be viewed as Findability tools. Table 3 offers some additional ideas on how SharePoint tools can be leveraged. This is not an exhaustive list.
Tool/Feature |
Putability
|
Findability
|
Both
|
Sites Directory |
X
| ||
Managed Paths |
X
| ||
Content Types |
X
| ||
My Site Personalization |
X
| ||
Audiences |
X
| ||
Scopes |
X
| ||
Records Center |
X
| ||
Site Columns |
X
| ||
Folders |
X
| ||
Metadata Managed Service |
X
| ||
Search web parts |
X
| ||
Indexing |
X
| ||
Breadcrumbs |
X
| ||
URL and Site Design |
X
|
SharePOint tool |
Information Organized by the tool
|
Sites Directory |
Links to the root sites of site collections
|
Web applications |
Root URLs and Managed Paths
|
Managed Paths |
Site collections that act as end-points of the "path"
|
Site Collections |
One or more sites that host lists and libraries related to a common project or collaboration effort
|
Site |
Lists and libraries
|
Lists and libraries |
Documents and content items
|
Content types |
Metadata that is related to a content element, such as a list item or document
|
Filtered views |
List data based on pre-selected metadata, sorting and/or grouping rules
|
Web Part Zones |
Web parts and their display
|
Audiences |
Reveals information based on audience membership
|
Records Center |
Official records that meet compliance requirements
|
Managed Metadata Service |
Tagging of information via content type syndication
|
RSS (Really Simple Syndication) |
Information that is delivered via the RSS standard
|
Phase 0: Information Organization Assessment
In the first phase, you'll want to gather information about the scope of the project and who the main stakeholders will be. You'll want to inform yourself about the environment in which you're working. Don't be fooled into thinking that you can bypass this stage because your working on your own environment. Doing this questionnaire will enable you to cover all the bases up front, loop in everyone who will be involved and set proper expectations on how the IOPS will flow.The questionnaire should cover the following topics:
- Definition of the documents that are in-scope vs. out of scope
- Definition of the systems that are in-scope vs. out of scope
Phase 1: Business Requirements Development
In this phase, you'll do essentially two things: build out the business requirements based on stakeholder interviews, the problem definitions from Phase 0 and an overall grassroots survey. You'll want to document the requirements and then hold a series of requirements workshops to vet the requirements and ensure that everyone agrees on the definition of the problem as well as what is required in the solution.This phase is an important phase that involves much writing and consensus building. This phase is illustrated in the next figure. But this phase will not complete the groundwork for your IOPS. Instead, you'll need to complete this phase in order to be prepared for Phase 2. It could be argued that the business requirement effort should be moved into Phase 0 and in some environments this will be the right way to conduct the IOPS. The placement of the effort to develop business requirements is in Phase 1, after the project has been approved and funded (which occurs after Phase 0), because of the cost and time consumption required to develop requirements.
Phase 3: Audit and Analysis
Taking the outputs from Phase 2, it's time to inventory the documents and records that are in-scope for the project as well as their security assignments. This is an exhaustive inventory and will require the purchase of third-party tools that can enumerate both the complete list of documents and well as their security descriptors.This part of an IOPS can be rather difficult, because you're trying to discover old, outdated or irrelevant data that can be discarded.
No comments:
Post a Comment