Implementing View-Level Security

Using a read access list is a way in which view access can be restricted. This can be considered security, however, only if the user who cannot access the view is also restricted from creating views of her own. Keep in mind that any user with design capabilities and the ability to create a view in your database can mimic any view that you restrict.

The read access list is contained in the Security tab of the View properties, as shown in Figure 23.17. The Security tab is represented by a key in all design elements that contain security.

Figure 23.17. The read access list for a view can be used to restrict access to data.

graphics/23fig17.jpg

To restrict access to the view, uncheck the All Readers and Above check box, and check the individual and group names in the name list for those names that should have access to the view. The entries that appear in the list are all the entries in the ACL, including any roles you've defined. You can also select individual names from the Domino Directory by clicking on the person icon next to the names list. Remember, this is a security refinement and does not override the ACL.

Notice the check box for Available to Public Access Users in Figure 23.17. Checking this box is all that's required to make a view available to public access users.

Part I. Introduction to Release 6

Whats New in Release 6?

The Release 6 Object Store

The Integrated Development Environment

Part II. Foundations of Application Design

Forms Design

Advanced Form Design

Designing Views

Using Shared Resources in Domino Applications

Using the Page Designer

Creating Outlines

Adding Framesets to Domino Applications

Automating Your Application with Agents

Part III. Programming Domino Applications

Using the Formula Language

Real-World Examples Using the Formula Language

Writing LotusScript for Domino Applications

Real-World LotusScript Examples

Writing JavaScript for Domino Applications

Real-World JavaScript Examples

Writing Java for Domino Applications

Real-World Java Examples

Enhancing Domino Applications for the Web

Part IV. Advanced Design Topics

Accessing Data with XML

Accessing Data with DECS and DCRs

Security and Domino Applications

Creating Workflow Applications

Analyzing Domino Applications

Part V. Appendices

Appendix A. HTML Reference

Appendix B. Domino URL Reference



Lotus Notes and Domino 6 Development
Lotus Notes and Domino 6 Development (2nd Edition)
ISBN: 0672325020
EAN: 2147483647
Year: 2005
Pages: 288

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net