Solved

All Readers and Above

Posted on 2009-04-10
9
316 Views
Last Modified: 2013-12-18
Is it possible that the document is created by a user which is not being displayed in Database ACL list? What does the 'All readers and Above' means. Does this implies all users have reading access to that document? Suppose 'Mr. x' create a document 'DocY'. Now 'Mr. x' is no longer exist in ACL. Can 'Mr.X' still be a reader of that document?
0
Comment
Question by:prpradip
  • 7
  • 2
9 Comments
 
LVL 22

Expert Comment

by:mbonaci
ID: 24114052
If the Default access to the db in the ACL is "No Access", nobody accept people (and groups) listed in ACL can access the database.

0
 
LVL 22

Expert Comment

by:mbonaci
ID: 24114057
"All readers and above" means that the document can be accessed by people who in the ACL has Reader or higher level of access.
0
 
LVL 22

Expert Comment

by:mbonaci
ID: 24114073
Advice:
If you have a person that has left the firm (or similar) and you want to deny him access to the server, create "Deny access group" in Names.nsf and add him there.
0
Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

 

Author Comment

by:prpradip
ID: 24114681
Thanx mbonacci,
Cant we control such issues creating Roles. If yes how?
0
 
LVL 22

Expert Comment

by:mbonaci
ID: 24114732
Roles are not used for that. They function on the database level, not server.
0
 
LVL 22

Accepted Solution

by:
mbonaci earned 90 total points
ID: 24114733
You can use groups in the names.nsf.
0
 

Author Closing Comment

by:prpradip
ID: 31568837
Thanx mbonaci,
very much
0
 
LVL 22

Expert Comment

by:mbonaci
ID: 24119763
I don't understand, why B?
0
 
LVL 22

Expert Comment

by:mbonaci
ID: 24138689
Can I please have an answer to my previous question?
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Saving email w/ attachments using lotus notes 7 309
Mobile Iron iphone stop receiving new mails 6 1,364
problem with deleted user 14 28
xss alert in domino url 9 32
This is an old article, please see an updated version of this article, located here: http://www.experts-exchange.com/articles/23619/Notes-8-5x-Windows-7-Notes-info-and-tips.html
Problem "Can you help me recover my changes?  I double-clicked the attachment, made changes, and then hit Save before closing it.  But when I try to re-open it, my changes are missing!"    Solution This solution opens the Outlook Secure Temp Fold…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

789 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question