Best Practices Domino Security - Nash!
Best Practices Domino Security - Nash!
Best Practices Domino Security - Nash!
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
How to protect real sensitive data?<br />
Use named encryption keys shared between all users<br />
who should be able to access this information<br />
Even administrators cannot read this information<br />
but could see the encrypted items - and still support users in<br />
case of problems<br />
This has to be enabled on application level<br />
Developers & Administrators need to work together to get this<br />
implemented properly<br />
Organizational Policies needed for generating and<br />
distributing keys