22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table 11-17 DOLS security options<br />

Option Description<br />

Tighten access to the database Open the ACL for the subscription and add the users and groups to<br />

whom you want to grant access. Anonymous must have “No Access.”<br />

Tighten security on the<br />

configuration document<br />

11.14 Notes client security<br />

528 Lotus Security Handbook<br />

To limit who can open and edit the Offline Subscription Configuration<br />

Profile document for a particular subscription, open the subscription's<br />

“DOLS Offline Configuration” form in Lotus Domino Designer 6 and<br />

change security settings in the Form properties.<br />

Tighten security on offline data To ensure that unsanctioned users cannot access the subscription<br />

data offline using another software product, encrypt the subscription<br />

in the Offline Subscription Configuration Profile document.<br />

Tighten security for all<br />

subscriptions on the server<br />

New for<br />

Domino 6<br />

To propagate a security setting to all the existing DOLS subscriptions<br />

on a server, make sure the subscriptions are set to inherit design<br />

changes from the DOLS Resource template (DOLRES.NTF); change<br />

the setting in DOLRES.NTF; then run the Designer task.<br />

Notes security features allow users to protect their own workspace and data.<br />

Starting with Notes 6, most of the security features offered in Notes have been<br />

merged in one dialog box called User Security. Prior to Notes 6, users accessed<br />

these features through file menu options or through user and mail preferences.<br />

The User Security dialog enables users to:<br />

► Synchronize their Notes password with their Windows or Domino<br />

Web/Internet passwords<br />

► Disable the password prompt when asked for their Notes password in other<br />

Notes-based programs, and check or request changes to their password<br />

settings<br />

► Re<strong>cover</strong> user IDs<br />

► Install and use a Smartcard reader to use Smartcards to login to Notes and<br />

store Internet private keys<br />

► Request Notes and Internet certificates<br />

► Use Notes and Internet certificates for mail encryption, and use digital<br />

signatures to sign mail<br />

► Set Notes to locally encrypt all new replicas of databases they create; encrypt<br />

documents with secret keys so that only people that users send the key to<br />

can read those documents<br />

► Set restrictions on active content that can be run on the workstation

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!