Chapter 10. Security

Terms you'll need to understand:

  • Authentication

  • Execution Control List (ECL)

  • Encryption

  • Role

  • Form Read Access list

  • Form Create list

  • View Access list

  • Consistent Access Control List (ACL)

  • Effective access

  • Extended ACL

  • Administration server

  • Sign fields

  • Names fields

  • Readers fields

  • Authors fields

  • Directory access

Techniques you'll need to master:

  • Methods of Database encryption

  • Use of Database roles

  • Understanding Mail encryption

  • Choosing a method of Document encryption

  • Uses of Form access control

  • Uses of Section access control

  • Uses of View access control

  • Techniques for Workstation security—Execution Control List (ECL)

  • Understanding ACLs and replication

Lotus Notes/Domino has a long-standing reputation as a robust, secure platform for application development. ...

Get Lotus Notes® and Domino® 6 Application Development Exam Cram™ 2 (Exams 610, 611, and 612) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.