Chapter 10. Security

Terms you'll need to understand:

  • Authentication

  • Execution Control List (ECL)

  • Encryption

  • Role

  • Form Read Access list

  • Form Create list

  • View Access list

  • Consistent Access Control List (ACL)

  • Effective access

  • Extended ACL

  • Administration server

  • Sign fields

  • Names fields

  • Readers fields

  • Authors fields

  • Directory access

Techniques you'll need to master:

  • Methods of Database encryption

  • Use of Database roles

  • Understanding Mail encryption

  • Choosing a method of Document encryption

  • Uses of Form access control

  • Uses of Section access control

  • Uses of View access control

  • Techniques for Workstation security—Execution Control List (ECL)

  • Understanding ACLs and replication

Lotus Notes/Domino has a long-standing reputation as a robust, secure platform for application development. From its inception, Notes was built upon a very flexible and comprehensive security model, which has undergone continuous enhancements during its long life. In our pervasively networked environment, building secure applications is becoming increasingly important.

This chapter covers various Domino security features that a Domino developer needs to know. Some of the topics covered in this chapter include Readers and Authors fields, Effective Access, Form Read and Create Access lists, and View Access lists, all of which you may be tested on in Exam 611.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.131.13.165