Solved

Lotus Notes signature file

Posted on 2013-11-13
7
575 Views
Last Modified: 2013-11-19
Hi

I have a script that has created an HTML signature file (signature.htm) on each users "d:\emailsig
folder".  I need help within a script that I will email to all users which will load into Lotus notes as their permament signature.
I'm using LN 8.5.1

Thanks
0
Comment
Question by:Bianchi928
  • 4
  • 2
7 Comments
 
LVL 46

Expert Comment

by:Sjef Bosman
ID: 39647281
It'll take you (us) quite some time to develop this completely error-free. Wouldn't it be better, more flexible, faster, etc. to use an off-the-shelf solution, instead of reinventing yet another wheel? I saw there's one by Whitsell Consultancy (no link, sorry), and there's this one: http://www.justfordomino.com/products.nsf/productid/85LKHJ?opendocument
0
 
LVL 1

Expert Comment

by:Hans Holt, Ph.D.
ID: 39648720
There is a Danish version witch I have used both with Windows and Linux Domino servers:

http://www.sander-software.dk/Websites/SS/webdk.nsf/vInfoID/RSHN-7WUR9V?OpenDocument

Google may help you translate the documentation.
0
 

Accepted Solution

by:
Bianchi928 earned 0 total points
ID: 39650584
I've got it and it's working

Set NotesSession = CreateObject("Notes.Notessession")
Set maildb= NotesSession.GetDatabase("", "")

Call Maildb.OpenMail

Set mailprof = maildb.GetProfileDocument("CalendarProfile")


'Remove any existing signature field from CalendarProfile
'Dim itmSig As NotesItem
Set itmSig = mailprof.GetFirstItem("Signature_Rich")
If Not itmSig Is Nothing Then mailprof.RemoveItem("Signature_Rich")

Call mailprof.ReplaceItemValue("EnableSignature", "1")
Call mailprof.ReplaceItemValue("SignatureOption", "2")
Call mailprof.ReplaceItemValue("Signature_1", "")
Call mailprof.ReplaceItemValue("Signature_2", "D:\emailsig\signature.htm")
Call mailprof.ReplaceItemValue("Signature", "D:\emailsig\signature.htm")
Call mailprof.ComputeWithForm(True, False)
Call mailprof.Save(True, False)
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 

Author Comment

by:Bianchi928
ID: 39650586
I did my reaserach and ame up with the solution
0
 
LVL 46

Expert Comment

by:Sjef Bosman
ID: 39650598
That's.... not bad, not bad at all!  :-)
0
 

Author Comment

by:Bianchi928
ID: 39654907
sjef_bosman.

Thanks
0
 

Author Closing Comment

by:Bianchi928
ID: 39658944
Happy with that
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

In this article we want to have a look at the directory attributes which are used by Microsoft to store the so called Security Identifiers (SID). These SIDs plays an important role in delegating and granting permissions and in authentication of trus…
Deploying a Microsoft Access application in a Citrix environment is not difficult but takes a few steps. However, Citrix system people are often of little help, as they typically know next to nothing about Access. The script provided here will take …
This video discusses moving either the default database or any database to a new volume.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now