How Does Domino Security Work?

Domino security is based on dual-key encryption technology known as the RSA Cryptosystem, which was developed by three now famous mathematicians: Rivest, Shamir, and Adelman (hence the name RSA ). Domino users and servers are given ID files that contain the user or server's name and password, as well as a public and private key. The public key is also stored in the Domino Directory (formerly known as the Public Name and Address Book ). A unique mathematical relationship exists between the two keys and is used in a process called authentication (discussed later in this section) to verify the identity of a user or server. When a user or server's identify has been established, access can be granted or denied to virtually any Domino resource. In fact, there are eight levels in which security can be applied, as shown in the following list:

  • Physical
  • Server
  • Database
  • Agent
  • Form
  • View
  • Document
  • Field

To build solid, secure applications, every developer must have a keen understanding of the eight levels of Domino security and how they can be interwoven to create application security that's nearly unbreakable .

Part I. Introduction to Release 6

Whats New in Release 6?

The Release 6 Object Store

The Integrated Development Environment

Part II. Foundations of Application Design

Forms Design

Advanced Form Design

Designing Views

Using Shared Resources in Domino Applications

Using the Page Designer

Creating Outlines

Adding Framesets to Domino Applications

Automating Your Application with Agents

Part III. Programming Domino Applications

Using the Formula Language

Real-World Examples Using the Formula Language

Writing LotusScript for Domino Applications

Real-World LotusScript Examples

Writing JavaScript for Domino Applications

Real-World JavaScript Examples

Writing Java for Domino Applications

Real-World Java Examples

Enhancing Domino Applications for the Web

Part IV. Advanced Design Topics

Accessing Data with XML

Accessing Data with DECS and DCRs

Security and Domino Applications

Creating Workflow Applications

Analyzing Domino Applications

Part V. Appendices

Appendix A. HTML Reference

Appendix B. Domino URL Reference



Lotus Notes and Domino 6 Development
Lotus Notes and Domino 6 Development (2nd Edition)
ISBN: 0672325020
EAN: 2147483647
Year: 2005
Pages: 288

Similar book on Amazon

Flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net