Task | Use |
Use the ACL to restrict application access. | Control Notes® and Internet/intranet user and Domino server access to an application. |
Enforce a consistent ACL. | Protects databases and templates on the server by forcing all changes to the ACL at a single location. |
Encrypt applications | Prevent unauthorized users from accessing an application locally on a server or workstation. |
Sign an application or template. | Identify the creator of an application or template. When a user accesses the application, the signature is checked to determined whether the action is allowed.
For example, on a Domino server the Agent Manager verifies the signature of an agent and checks whether the signer has the rights to perform the action. On a Notes® client, the signature is checked against the signer's rights in the workstation ECL. |
Encrypt incoming and outgoing Notes mail. | Ensure that only the intended recipient can read mail. |
Electronically sign mail messages. | Verify that the person who sends the message is the author and that no one has tampered with the data. |