Security and Domino Applications
By Dave Hatter
IN THIS CHAPTER
- How Does Domino Security Work?
- Enabling Physical Security
- Setting Server Access
- Database Access Control Lists
- The Role of the Domino Directory in Application Security
- ACL Privileges
- Enabling Database Encryption
- Using Roles
- Implementing View-Level Security
- Implementing Form-Level Security
- Implementing Document-Level Security
- Applying Field-Level Security
- Hiding the Design of Your Application
For many years , Domino has provided one of the most comprehensive and robust security models available on any application development platform. Notes/Domino 6 continues in the nearly legendary tradition of its predecessors by providing a rich set of security features that meet the security requirements of even the most complex applications. Best of all, the tremendous power of Domino security is available in your applications with little, and in some cases, no coding required. If you're new to Domino but have worked with other development platforms, you'll be amazed at how quickly and easily you can build highly secure applications for even the most demanding security conscious environments.
Because this book is designed for application developers, this chapter isn't intended to provide comprehensive coverage of Notes/Domino security, which can and does fill entire books, such as Domino System Administration from New Riders. Rather, this chapter covers the information that developers need to build secure applications.
NOTE
As an application developer, you might not have the authority necessary in the Domino Directory to change any or all the security related settings this chapter discusses. You might need to seek the assistance of a system administrator who is skilled in this area.