22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

492 Lotus Security Handbook<br />

Figure 11-18 Password used before dialog box<br />

11.10.3 Password checking events<br />

Here we show the complete set of password checking events, from beginning to<br />

end. Both a pseudocode representation of the process and an associated<br />

flowchart (which conforms in all points to the pseudocode) is provided here.<br />

The warnings detailed previously can be seen in the flowchart and in the<br />

pseudocode. As well, there are some additional checks carried out by the server<br />

to ensure that digests and dates are kept in sync. A good example of this is when<br />

the client sends a user's ID digest to the server that is stamped with a date so far<br />

in advance of the server time that it hints to the server that there must be<br />

something wrong with the client OS clock. In such a situation, the client will see<br />

the following message: "Connection failed because of a problem with clock<br />

synchronization and password change intervals. Check your clock<br />

setting, change your password, or consult your system administrator."<br />

Both the flowchart and the pseudocode also help show in what state the Notes<br />

user ID and person documents are when clients receive warnings or are denied<br />

access to the server.<br />

The flowchart can be found in Figure 11-19 on page 493, while the pseudocode<br />

is listed on the pages immediately after.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!