Professional Documents
Culture Documents
DB.NSF
enter:____________ document1 xxxx xxxxx xxxxx xxxxx
122 345 5 23
x: text1 document2 14 12 12 15
x text2 document3 77 32 6
Sign by: __________
Definition of a Domino Server
NOTE
S
Domain
Names.nsf
Names.nsf
Names.nsf
What is Replication?
Pull
Pull/Pull
Push
Single Domain
Advantages
Provides clear view of the Domino topology
Facilitates centralized management
Better ACL control
Easier Mail addressing
Easier to send signed mail
Disadvantages
Address book may be very large
Controlling access to the address book may be complex
Multiple Domains
Advantages
Facilitates distributed management
Local support can be responsive
Easier to deploy in a decentralized organization
Smaller N&A book
Easier to replicate
Disadvantages
Managing the overall topology may be complex
Managing ACLs in applications that span domains is challenging
Controlling domain proliferation may be difficult
Notes Named Network
Names.nsf
Multi-protocol
Servers
Mail Servers
Network Firewalls
Fields Encryption
Notes Security
Passwords
ID(May have multiple passwords)
Server Console
Certification and authentication
User and server verify each other's identity
Access control lists
For servers and databases
Reader and author names fields in documents
Encryption
At the field level
Server Security
Access Server
Create Databases
Create Replicas
Passthrough Server (to and through)
Run agents
Database Access Control List
ACL
Level Access
No Access No Access to Database
Depositor Add Documents Only
Reader Read Only
Author Read/Add/Change Own
Editor Read/Add/Change All
Designer Change Design
Manager Perform All Operations
ACL Specification
Domino Implementation Overview
Install hardware
Install software
Customize/setup
Install
Connect and maintain servers
Register and maintain users
Set up and maintain routing and replication
Manage Notes security
Post-Install Set backup strategy
Troubleshoot problems
What does a Notes Administrator do?
NOTES.INI
Server console commands (local or remote)
Public Address Book
Administration Control Panel
New to 5.0, can run on another computer
Administration Process (AdminP)
Monitoring and statistics databases
Web Administration Database
Third party tools
Key Notes Files and Databases(1)
AdminP Reporter
Catalog Router
Compact Statlog
Event Stats
Fixup HTTP
Design Web
Updall Sched
Replica Calconn
Controlling Notes through NOTES.INI
Change the interval field in the AdminP section of the Server Document
or
At console, type
Set Config ADMINPINTERVAL=15
or
Create a Configuration Document in the Address Book that sets
ADMINPINTERVAL to 15
or
Edit NOTES.INI to read
ADMINPINTERVAL=15
HELP
SHOW
TASKS
USERS
DISKSPACE
MEMORY
PORT
CONFIG
QUIT
More Console Commands...
SET
CONFIG
SECURE
LOAD
TELL
REPLICATE
PUSH
PULL
ROUTE
BROADCAST
Remote Console
The Name and Address Book
Groups
Locations
People
Server
Certificates 15
Clusters
Configurations
Connections
Domains
Servers
and more...
Server Document
Person Document
Public vs. Personal Address Book
Each Notes client also has a personal address book stored on the
workstation that contains the user's personal groups and frequent
correspondents, as well as information about how the user interacts with
servers and the network
The file name for the personal Name and Address Book is also
NAMES.NSF
For the administrator using the server as a workstation,
the NAB is shared
Database Management Tools
Registering and Connecting Additional Servers
Inspired by X.500
Name includes organizational structure
Always has a Common Name and Organization name
Optional Country code and up to four levels of Organizational Unit names
e.g., John Smith/CAM/Lotus
Direct
CN OU O
ory
Hierarchical Naming Conventions
Memorable names
e.g., Marketing, Accounting
Descriptive hierarchical names
e.g., Marketing/M/NYC
Descriptive flat names
e.g., Acme_NY_Mail1, Acme_NY_DB2, Acme_NY_Hub1
Registering/Certifying Users
Every user who will access Notes with a Notes client must be registered
User Registration is performed through the Administration Control Pane
or in batch from an ASCII file
At User Registration:
A user ID file is created, containing the user's name, password, and
encryption keys, and stamped with a certificate
A person document for the user is added to the server's Public Name and
Address Book
A mail file is created for the user on the designated Home server
Authentication
ID file contains:
User/server name and password
Creation/expiration info
License number
Certificates
Public key
Private key
Encryption key(s)
ID files whose certificates share a common ancestor can
authenticate with each other
Interacting with Other Organizations
Move Users and Servers Within a Hierarchy
Delete Users, Servers, and Groups
Globally Convert IDs from Flat to Hierarchical
Each database to be managed by ADMINP has an administrative serv
assigned
AdminP requests are stored in ADMIN4.NSF
Setting Up Mail Databases
Mail may be stored in shared mail databases (single copy object store) or individual mail database
With shared mail, the router splits the mail message into two parts:
Header - put into each recipient's mail file
Content (body) - put into active shared mail database
Domain1
Non-Adjacent Domain Domain3
1-3
Connection 1-2
Connection 2-3
Domain2
Mail Routing to Foreign Domain
DOM001 Foreign
Domain Document
OfficeVision
NAB
Gateway
Mail Addressing
High priority
Routed immediately, regardless of routing schedule
Normal priority
Routed immediately within the same Notes Named Network
Routed at next scheduled time
Routed if "route-at-once" limit is reached
Default
Low priority
Routed between 12:00 AM and 6:00 AM
Not routed with normal or high mail during other times
Setting up Database Replication
D
D-C
A C
A-B
A-D C-A
B-D
B-C
B
Hub-and-spoke topology
To Hub
G X B
Connections
A
in N/A Book
A-B
A-C
A-D F C
A-E
A-F
A-G Domino
A-X Hub
Server
E D
Hub-and-spoke replication schedule
:30
:50 :40
Backing up the System
Statistics
How big/active are the databases?
Which databases replicated today?
How much disk space is available?
Is there mail that cannot be delivered?
Events
The replication could not complete
The disk hit 95% full
An unauthorized user tried to access the server
Monitoring Tools
Document problems
Build a question and answer database
Interface with Lotus Technical Support
Develop procedure for . . .
Handling problems
Applying fixes
Upgrading to new releases
Develop disaster recovery plan