22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

New for<br />

Domino 6<br />

To determine the effective access that a person, group, or server has to a<br />

database, highlight the appropriate entry in the database ACL and click “Effective<br />

Access. This opens a dialog box that shows:<br />

► The selected name's effective database access level as determined by the<br />

database ACL.<br />

► The access rights for the selected name.<br />

► All the individual and group name entries and roles that could potentially<br />

control the selected name's access to the documents in the database.<br />

► “Full Access Administrator” is checked if the person, server, or group has full<br />

administrator rights to the database.<br />

From this point, you can determine other users’ access by selecting a new name<br />

in the Names box and clicking “Calculate Access.”<br />

Important: A user may still have access to a database by running an agent<br />

with the “Unrestricted with Full Access” privilege, even if his or her name is not<br />

listed in the database's ACL. This privilege exists, but is not reflected in<br />

Effective Access because this privilege bypasses the ACL and reader lists. For<br />

example, an administrator may want to run this type of agent on a database he<br />

or she does not have access to in order to update a full-text index on that<br />

database.<br />

“Enforce consistent ACL” and local replication<br />

Prior to Domino 6, users who locally replicated databases that did not have<br />

“enforce consistent ACL” enabled were given full access to the database, with no<br />

roles assigned. As a result, the user might change things which ultimately would<br />

not replicate. In R6, when a user replicates a database locally, Domino<br />

propagates the user's access as it is known on the server, and enforces it when<br />

available. This happens automatically for local replication, regardless of whether<br />

“Enforce a consistent Access Control List” is enabled. The behavior relies on the<br />

nameslist which is propagated during replication. It will not take effect until after<br />

the first time the user replicates and the database acquires the user’s access<br />

from the server.<br />

It should be noted that local replicas with “Enforce a consistent access control<br />

list” enabled attempt to honor the information in the ACL and determine who can<br />

do what accordingly. However, they have some limitations. One limitation is that<br />

group information is generated on the server, not at the local replica. When a<br />

database is replicated locally, information about the group membership of the<br />

person doing the replication is stored in the database for use in ACL checking. If<br />

a person/identity other than the one doing the replication accesses the local<br />

replica, there will be no group membership information available for that person,<br />

Chapter 11. Domino/Notes 6 security features 509

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!