Terms you'll need to understand:
Access Control List (ACL)
Anonymous access
Web authentication
Notes authentication
Field Encryption
Secure Socket Layers (SSL)
Maximum Internet Access
Roles
File Protection Documents
Concepts/Techniques you'll need to master:
Understanding security differences between Web and Notes clients
How to plan application security based on Web Authentication
Setting database access
Setting field access
Controlling access to CGI directories
Setting File Protection documents
Understanding and determining Secure Sockets Layer (SSL)
When developing an application, you need to know not only the purpose of the application but also what needs to be done to protect it. Understanding the Domino Security Model is a first step to securing your applications. Application developers use the Domino Security Model to guarantee data is accessible only to those users whom it was intended. This is especially true for Web browsers, where TCP/IP is an open protocol.
Security is a concern to both Administrators and Designers. This chapter discusses security issues related to accessing applications through both Notes and Web clients and addresses the security topics covered on the 612 exam.
18.119.28.108