Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL

Chapter 7: Facilities Management > High-Level Solution


This chapter’s solution is the most complex covered so far in the book and blends human control (a broker) with automated processing (SharePoint Designer workflow). In addition, it addresses one of SharePoint’s more significant security holes: the lack of column-level security.

Solution Overview

To implement the facilities management application, you must create a solution that leverages a number of out-of-the-box SharePoint components and create a fairly complex SharePoint Designer workflow.

The solution starts with a facilities request. Someone (a requestor) needs some work done. The requestor fills out a simple form and submits the request. This implies the need for a content type and a custom list.

After the requestor submits the request, it is routed to the facilities manager. The facilities manager analyzes the request and estimates the cost. He then enters the cost onto the request. This now allows the workflow to build an approval tree. You don’t want to allow requestors to enter the estimated cost. Up until this point in the book, when you’ve had a security requirement, it generally centered upon an entire library or a list item as a whole. This is the first time you’ve had a requirement for securing individual columns.


You are currently reading a PREVIEW of this book.


Get instant access to over $1 million worth of books and videos.


Start a Free 10-Day Trial

  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint