|
If I recall correctly, they only need "*X" (execute) data authority access to the folders (not even objects in the folders) above the ones they need access to. They do not need *R read access. I'm not sure about the symbolic link, try it and see. Personally, I put all the HTML directories outside of the Domino data directory, under a /www folder (not a symbolic link). Domino has no trouble accessing them there. Don't forget to assign directory rights within Domino as well if necessary. Tom domino400-bounces+tkreimer=infoalt.com@xxxxxxxxxxxx wrote on 03/30/2005 02:10:35 PM: > I thought that would work too. However I discovered that I had to also > give them access to the following directories: > /NOTES > /NOTES/DATA > /NOTES/DATA/domino > > I'm wondering if I should do something weird like change the html > directory to be a symbolic link to another directory, outside of the > Domino data structure, that they do have access to. A symbolic link is > like a directory pointer. For example > WRKLNK ... > Object link Type > . DIR > .. DIR > .eclipse DIR > bin SYMLNK->DIR > ... > I see them on occasion. Just haven't figured out how to create them > myself, or, if they are the right fit for this situation. > > Rob Berendt > -- > Group Dekko Services, LLC > Dept 01.073 > PO Box 2000 > Dock 108 > 6928N 400E > Kendallville, IN 46755 > http://www.dekko.com > > > > > > seanmurphy@xxxxxxxxxxx > Sent by: domino400-bounces+rob=dekko.com@xxxxxxxxxxxx > 03/30/2005 01:52 PM > Please respond to > Lotus Domino on the iSeries / AS400 <domino400@xxxxxxxxxxxx> > > > To > domino400@xxxxxxxxxxxx > cc > > Subject > Re: html directory security. > > > DO workaut /NOTES/DATA/domino/html > > and add the developers with RWX to that folder. You can click permissions > in Operations Navigator to do the same thing. > > They should be able to map a drive, use FTP or Operations Navigator to > manipulate the files in that folder. > > > Sean > > http://www.bedbathandbeyond.com > > > > domino400-request > @midrange.com > Sent by: To > > domino400-bounces domino400@xxxxxxxxxxxx > +seanmurphy=bedba cc > > th.com@xxxxxxxxxx > om Subject > > Domino400 Digest, Vol 3, Issue 55 > > 03/30/2005 01:01 > PM > > > Please respond to > domino400@midrang > e.com > > > > > > > Send Domino400 mailing list submissions to > domino400@xxxxxxxxxxxx > > To subscribe or unsubscribe via the World Wide Web, visit > http://lists.midrange.com/mailman/listinfo/domino400 > or, via email, send a message with subject or body 'help' to > domino400-request@xxxxxxxxxxxx > > You can reach the person managing the list at > domino400-owner@xxxxxxxxxxxx > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of Domino400 digest..." > > > Today's Topics: > > 1. html directory security. (rob@xxxxxxxxx) > > > ---------------------------------------------------------------------- > > message: 1 > date: Wed, 30 Mar 2005 11:16:31 -0500 > from: rob@xxxxxxxxx > subject: html directory security. > > I want our web development team to be able to put in updates in our > /dominoservername/NOTES/DATA/domino/html > directory. However I do not want them to be able to access stuff in the > DATA directly using OS commands. Currently, to get the project done, I > set up an authorization list, associated it with every directory in the > above chain and gave the web developers God like authority in that > authorization list. > Soliciting for suggestions. > > > Rob Berendt > -- > Group Dekko Services, LLC > Dept 01.073 > PO Box 2000 > Dock 108 > 6928N 400E > Kendallville, IN 46755 > http://www.dekko.com
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.