Chapter 17. Security
Terms you'll need to understand:
Access Control List (ACL)
Anonymous access
Web authentication
Notes authentication
Field Encryption
Secure Socket Layers (SSL)
Maximum Internet Access
Roles
File Protection Documents
Concepts/Techniques you'll need to master:
Understanding security differences between Web and Notes clients
How to plan application security based on Web Authentication
Setting database access
Setting field access
Controlling access to CGI directories
Setting File Protection documents
Understanding and determining Secure Sockets Layer (SSL)
When developing an application, you need to know not only the purpose of the application but also what needs to be done to protect it. Understanding the Domino Security Model is a first ...
Get Lotus Notes® and Domino® 6 Application Development Exam Cram™ 2 (Exams 610, 611, and 612) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.