Solved

Web Only

Posted on 2006-10-26
8
195 Views
Last Modified: 2013-12-18
I would like an alternative solution in prohibiting Notes users from using their id to access the Domino environment. The only solution I can think of is re-creating the account by having the system override the existing settings, do not distribute the user id, and reset the HTTP password. Are there any other options besides this one?
0
Comment
Question by:jahhan
  • 4
  • 3
8 Comments
 
LVL 46

Expert Comment

by:Sjef Bosman
ID: 17813569
Yes, if I understand you right that you want to deny access to users who left the company: create a Deny group in the NAB and put those isers in there.
0
 
LVL 63

Expert Comment

by:SysExpert
ID: 17813616
sjef_bosman is correct, that is why deny aces groups exist.

If you are reusing ID's generically, then this will not work.

You can also force a pasword change at login and not allow older passwords to work.

I hope this helps !
0
 

Author Comment

by:jahhan
ID: 17813710
I want to only allow web access and not Notes client access.  
0
 
LVL 46

Accepted Solution

by:
Sjef Bosman earned 250 total points
ID: 17814239
Ah, that's it. Just don't create an ID-file for them automatically, but create only a Person document, and do that manually.
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 

Author Comment

by:jahhan
ID: 17814647
Is there another way besides this solution?
0
 
LVL 46

Expert Comment

by:Sjef Bosman
ID: 17814831
I have no idea...

1) don't give them the ID-file
2) give the ID-file but give it a password that's unknown to them
3) block incoming port 1352 from their PC's
0
 

Author Comment

by:jahhan
ID: 17815063
sjef_bosman,
thanks for the info I figured this would be the only solution.
0
 
LVL 46

Expert Comment

by:Sjef Bosman
ID: 17815154
Well, we're no saints out here, we don't know everything. There may be tools (3rd party) that do what you want. But I don't know that. I'll ask someone else to visit this question, but, again, don't expect miracles: just another expert ;-))

Thanks!
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

For users on the Lotus Notes 8 Standard client, this article provides information on checking the Java Heap size and adjusting it to half of your system RAM in attempt to get the Lotus Notes 8.x Standard client to run faster.  I've had to exercise t…
IBM Notes offer Encryption feature using which the user can secure its NSF emails or entire database easily. In this section we will discuss about the process to Encrypt Incoming and Outgoing Mails in depth.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now