Solved

Can I use Common Names in computed controlled access sections?

Posted on 2002-06-11
7
173 Views
Last Modified: 2013-12-18
Hello all, hope you are well!!

What are the 'rules' for using computed controlled access sections?  I want to give access to the user(s) named in a field but it doesn't appear to work if the field contains common names..  Is this the case and is there any way around it?

Also, what about readers and authors, do Common Names work and should I use them?

If anyone could provide a quick summary of what works and should be used then I'd be very grateful as i'd like to have editable names fields being translated to the common version, but still working when referred to in computed controlled access sections, author and reader fields..

Thanks a lot

Ian
0
Comment
Question by:IanWood
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
7 Comments
 
LVL 24

Accepted Solution

by:
HemanthaKumar earned 100 total points
ID: 7070395
The common name becoming a valid entity for access control or reader/author field depends upon the way the person record is setup in the address book. Check the shortname field of the person reecord ( or you can click the db icon and then click the groups and roles bar in the statur bar , this will show if your common name is listed to be authenticated), if it doesn't contain the common name part as seperate entry then server doesn't know how to validate the userid. So to avoid this problem, use Fully Qualified Name (i.e with OU and O part)

~Hemanth
0
 

Author Comment

by:IanWood
ID: 7070649
Cheers for that..  I've had a look and my short name is entered but not the same as my common name, which is pretty useful and my common name appears in the groups and roles bit!!  So, any ideas what that means then?
0
 

Author Comment

by:IanWood
ID: 7070654
Cheers for that..  I've had a look and my short name is entered but not the same as my common name, which is pretty useful and my common name appears in the groups and roles bit!!  So, any ideas what that means then?
0
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 24

Expert Comment

by:HemanthaKumar
ID: 7070931
The Groups And Roles dialog contains groups returned by querying the FQN against your Address book, plus the id information (not the shortnames). But the shortname field is used to authenticate !

0
 
LVL 10

Expert Comment

by:zvonko
ID: 7071192
Short question Heman: what happens when accessing a server in adjacent Notes domain using a cross certificate? There is no person record of mine on this server :-)

0
 
LVL 24

Expert Comment

by:HemanthaKumar
ID: 7071486
Certificates !
0
 

Author Comment

by:IanWood
ID: 7072395
Hi Guys, thanks for that!!

I'm leaving shortly and won't be around to monday - I'm going to leave the question open in case anybody wants to add and will close when I get back..

Cheers

Ian
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Lotus Notes to MS Exchange mailfile migration 4 77
Incorrect reply-to address Lotus 2 46
Lotus Notes: Email Delivery Failure 5 229
Lotus Domino 9 web server 6 101
For beginners of Lotus Notes user this is important to know about the types of files and their location supported by IBM Notes. Mostly users are unaware about how many file types are created and what their usages are. This Article is fully dedicated…
IBM Notes offer Encryption feature using which the user can secure its NSF emails or entire database easily. In this section we will discuss about the process to Encrypt Incoming and Outgoing Mails in depth.
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question