Overview
This chapter provides a variety of information pertaining to database security, access permissions, and roles. Although the majority of the chapter covers various aspects of the Access Control List, it also explains how to protect LotusScript source code, sign a database, and implement digital cross certificates to allow users to access Domino servers that reside in another Domino domain.
By the end of the chapter you will have learned
- Fundamentals of the Access Control List
- Access authority levels
- How to manage database access
- How to manage form-level access
- How to manage field-level access
- How to enforce consistent ACL settings across replicas
- How to "sign" a database
- How to "cross certify" servers
|