Terms you'll need to understand:
Authentication
Execution Control List (ECL)
Encryption
Role
Form Read Access list
Form Create list
View Access list
Consistent Access Control List (ACL)
Effective access
Extended ACL
Administration server
Sign fields
Names fields
Readers fields
Authors fields
Directory access
Techniques you'll need to master:
Methods of Database encryption
Use of Database roles
Understanding Mail encryption
Choosing a method of Document encryption
Uses of Form access control
Uses of Section access control
Uses of View access control
Techniques for Workstation security—Execution Control List (ECL)
Understanding ACLs and replication
Lotus Notes/Domino has a long-standing reputation as a robust, secure platform for application development. From its inception, Notes was built upon a very flexible and comprehensive security model, which has undergone continuous enhancements during its long life. In our pervasively networked environment, building secure applications is becoming increasingly important.
This chapter covers various Domino security features that a Domino developer needs to know. Some of the topics covered in this chapter include Readers and Authors fields, Effective Access, Form Read and Create Access lists, and View Access lists, all of which you may be tested on in Exam 611.
3.131.13.165