July 3, 2015
In our blog post titled “Production Implementation Guide Part One: IBM Notes Application Inventory,” we discussed the importance of getting an adequate picture of what IBM Notes applications you actually have in production. Here, we’ll examine another important step to managing your Notes infrastructure as effectively as possible: security.
You need to control who has access to what and when they’re allowed access. Along with that, you need to establish a mechanism for locking down applications. You can only allow controlled security changes to take place from an application access perspective.