22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

424 Lotus Security Handbook<br />

database, as it assures that the document is authentic and was not tampered<br />

with in any way by anyone). In addition, digital signatures ensure that the<br />

message signer (or the document author) cannot say they did not send the<br />

message (or write the document). This is referred to as “non-repudiation.”<br />

Like encryption, the digital signature process is essentially transparent to the<br />

user. Digital signatures (for e-mails, in this example), work in the following<br />

manner:<br />

1. The sender's e-mail client computes a message digest of the entire message.<br />

A message digest is a one-way hash of the entire message that results in a<br />

unique fixed-length hash of the message (regardless of the message's actual<br />

length).<br />

2. The sender's e-mail client encrypts the message digest using the sender's<br />

private key, and then attaches both the encrypted message digest and the<br />

sender's certificate (which provides the public key) to the message.<br />

3. The recipient's e-mail client decrypts the message digest using the signer's<br />

public key, which is part of the signer's certificate.<br />

4. The recipient's e-mail client computes its own message digest, and compares<br />

it with the one attached to the e-mail. If the two message digests are identical,<br />

the message is assured to be from the sender and unaltered in transit.<br />

Access control<br />

Every database includes an access control list (ACL) which Domino uses to<br />

determine the level of access that users and servers have to that database.<br />

When a user opens a database, Domino classifies the user according to an<br />

access level that determines privileges. The access level for a user may vary in<br />

different databases.<br />

The access level assigned to a user determines the tasks that the user can<br />

perform in the database. The access level assigned to a server determines what<br />

information the server can replicate within a particular database. Only someone<br />

with Manager access can create or modify the ACL of a database located on a<br />

server.<br />

Access control levels include, from least to most permissive: No Access,<br />

Depositor, Reader, Author, Editor, Designer, Manager.<br />

Execution control<br />

The ECL, introduced in Notes 4.5, enables users to protect their data against the<br />

threats of e-mail bombs, viruses, Trojan horses, and unwanted application<br />

intrusions. The ECL provides a mechanism for managing whether such

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!