Implementation

After you create a folder hierarchy and a category structure, you must create an overall security policy and identify further sources of content. This section highlights the remaining tasks.

Adapting Folders

It is recommended that you track your process as you adapt existing folder hierarchies to a workspace. The decision on each folder combination remains a manual process, but you can automate much of the process. You can build a spreadsheet that contains a mapping from the original folder hierarchy to the workspace structure. Then, build a script to parse the spreadsheet, build the taxonomy in an empty workspace, and import and tag the content. For more information about this, see Appendix B, For More Information.

Applying Security Policies

After building the workspace structure, you should complete the following tasks:

  • Map security into workspace. After creating the structure, you still must assess security. You may choose to break security inheritance and specify actual permissions on secured folders.
  • Specify content sources. The workspace contains only native content, but you may consider including external content also.
  • Designate folder coordinators. From the planning stage, you identified coordinators, however, you still must assign them to the appropriate folders.
  • Specify approval routes. Again, you must identify and implement approval routes and approvers.
  • Identify Best Bets. Categories and search keywords become much more useful after you define Best Bets, but much of that definition comes from authors rather than coordinators, and evolves over time.


Microsoft Sharepoint Portal Server 2001 Resource Kit
Microsoft SharePoint(TM) Portal Server 2001 Resource Kit (Examples & Explanations Series)
ISBN: 0735615624
EAN: 2147483647
Year: 2001
Pages: 231

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net