Application security
Restrict access to Domino® applications to prevent unauthorized users from gaining access to information.
| Task |
Use |
|---|---|
| Use the ACL to restrict application access. |
Control Notes® and Internet/intranet user and Domino® server access to an application. |
| Enforce a consistent ACL. |
Protects databases and templates on the server by forcing all changes to the ACL at a single location. |
| Encrypt applications |
Prevent unauthorized users from accessing an application locally on a server or workstation. |
| Sign an application or template. |
Identify the creator of an application or template. When a user accesses the application, the signature is checked to determined whether the action is allowed. For example, on a Domino® server the Agent Manager verifies the signature of an agent and checks whether the signer has the rights to perform the action. On a Notes® client, the signature is checked against the signer's rights in the workstation ECL. |
| Encrypt incoming and outgoing Notes® mail. |
Ensure that only the intended recipient can read mail. |
| Electronically sign mail messages. |
Verify that the person who sends the message is the author and that no one has tampered with the data. |