Application design element security
An application developer can further restrict access to design elements within an application using IBM® Domino® Designer.
Application design security takes effect once users gain access to an application.
Task |
Use |
---|---|
Create Read access lists for views. |
Specify which Notes® and Internet/intranet users can see a view. |
Create Read and Edit access lists for folders. |
Specify which Notes and Internet/intranet users can see a folder or update the contents of a folder. |
Create Read and Edit access lists for forms. |
Specify which Notes and Internet/intranet users can create, modify, or read documents created with a form. |
Create Readers and Authors fields. |
Specify which Notes and Internet/intranet users can create, modify, or read specified documents. |
Create signed fields. |
Verify that the Notes user who originated the data is the author and that no one has tampered with the data. |
Create encrypted fields. |
Control which Notes users can access a field in a form. |
Create hidden fields. |
Control which Notes and Internet/intranet users can access a field in a form. |
Create Read and Edit access lists for sections. |
Specify which Notes and Internet/intranet users can access a section in a document. |
For more information on securing application design elements, see IBM Domino Designer 9.0.1 Social Edition Help.