Solved

Which is better ? Change the ACL or add the user on the Delegation screen ?

Posted on 2004-09-02
4
246 Views
Last Modified: 2013-12-18

I'm offen asked to allow user acess to another user's mailbox.
Sometimes I add the user to the ACL list at some other time I add the user in Tools-Preferences-Delegation.
Till now I didn't noticed any difference between the two option.
But I think there must be some otherwise it wouldn't make sense for me two option with the same result ( effect)
What's the difference?

Thanks,
0
Comment
Question by:verto33
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 8

Accepted Solution

by:
Jean Marie Geeraerts earned 50 total points
ID: 11970754
Actually, if you add a user to your delegation profile, Notes will add this user to the ACL of the database and give him/her the rights needed as specified in the options in the delegation profile.
So, basically there's no difference.

Only advantage of using the delegation profile is that you don't have to know what rights to give to a user in the ACL so he/she can do just what he/she needs to in your mail/calendar.
0
 
LVL 19

Assisted Solution

by:madheeswar
madheeswar earned 50 total points
ID: 11970764
When you give people access to your mail database, they can't read encrypted mail that you receive. Additionally, you can't read encrypted messages they create for you unless your user ID contains the encryption key used to encrypt the messages.

Both are same, except the above.
0
 

Author Comment

by:verto33
ID: 11970859

Though I have been using Lotus Notes for years I never encrypted a single mail nor did the users.

Thank you both.
0
 
LVL 8

Expert Comment

by:Jean Marie Geeraerts
ID: 11987851
You're welcome.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

You’ve got a lotus Domino web server, and you have been told that “leverage browser caching” is a must do. This means that we have to tell the browser everywhere in the web to use cache. In other words, we set (and send) an expiration date in the HT…
IBM Notes offer Encryption feature using which the user can secure its NSF emails or entire database easily. In this section we will discuss about the process to Encrypt Incoming and Outgoing Mails in depth.
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question