Solved

Using Roles in Domino Designer

Posted on 2008-10-23
9
323 Views
Last Modified: 2013-11-17
I have several roles setup in an ACL for a Notes database, so for example AAccess, BAccess, and so forth.  What I want to do is restrict whom can edit documents, so if someone for AAccess created, everyone else can read but not edit,(obviously the role for FullAccces(Manager))

Thanks a bunch....
0
Comment
Question by:mhoover
  • 4
  • 3
  • 2
9 Comments
 
LVL 46

Expert Comment

by:Sjef Bosman
ID: 22786986
Don't quite understand where you're going to...

All ordinary users in the database should have Author rights. To restrict who can modify a document, you need an Authors field in that document. In your case, if the document should be editable by someone with the AAccess role, the field should have the value "[AAccess]".
0
 
LVL 63

Accepted Solution

by:
SysExpert earned 125 total points
ID: 22787272
0
 

Author Comment

by:mhoover
ID: 22787367
Doesnt it depend on what group or role the author is a part of?  If I have 4 crews A,B,C,D - 2 users each are assigned to the group A, B, and so forth.  I add each group the database ACL.  I then create four roles within the ACL so, A group has role AAccess, B has BAccess.  If A creates a document, then I only want A to be able to edit - everybody else can read.  If the authors field has the default value of [AAccess], how will it handle the other crews? Anybody can create a document..  Do I need to add an authors filed for each Crew i.e. A,B C, or D???
0
 
LVL 46

Expert Comment

by:Sjef Bosman
ID: 22787481
You can programmatically set the value of the Authors field of course. For example, if you set the value to @UserRoles, and you make the field Computed when composed, it will retain all roles of the creator.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 63

Expert Comment

by:SysExpert
ID: 22792728
Yes you will need a reader field with all the other roles in it


I hope this helps !
 
0
 
LVL 46

Expert Comment

by:Sjef Bosman
ID: 22842500
Did you consider to split the points? Or didn't you know that it is possible? See the EE-Help about how to grade and to reward experts: http://www.experts-exchange.com/help.jsp
0
 

Author Comment

by:mhoover
ID: 22842968
I didn't know that it was possible I apologize.
0
 
LVL 46

Expert Comment

by:Sjef Bosman
ID: 22843120
You should be here more often, unless you never have problems :-)  

Next time better...
0
 

Author Comment

by:mhoover
ID: 22843396
Thank you all for your help...  
Kind regards...
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Validating Email Address 13 283
Lotus notes email code 2 194
Combine textlist text elements in Lotus Notes ReadViewEntries 3 121
Add a cc field to email code 6 97
This is an old article, please see an updated version of this article, located here: http://www.experts-exchange.com/articles/23619/Notes-8-5x-Windows-7-Notes-info-and-tips.html
Problem "Can you help me recover my changes?  I double-clicked the attachment, made changes, and then hit Save before closing it.  But when I try to re-open it, my changes are missing!"    Solution This solution opens the Outlook Secure Temp Fold…
Delivering innovative fully-managed cloud services for mission-critical applications requires expertise in multiple areas plus vision and commitment. Meet a few of the people behind the quality services of Concerto.
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

939 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now