Plan 46
Plan 46
Powered by Notes The First Groupware and E-mail Server for the Net
RELEASE
COPYRIGHT
Under the copyright laws, neither the documentation nor the software may be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form, in whole or in part without the prior written consent of Lotus Development Corporation, except in the manner described in the software agreement. Copyright 1995 - 1997 Lotus Development Corporation 55 Cambridge Parkway Cambridge, MA 02142
All rights reserved. First edition printed 1997. Printed in the United States. Domino, Domino.Action, Domino.Broadcast, Domino.Connect, Domino.Merchant, Lotus Notes Desktop, Notes, NotesBench, NotesPump, NotesSQL, Notes Desktop, Notes Mail, Weblicator, and Work The Web are trademarks and Lotus, Lotus Notes, Lotus Organizer, LotusScript, Notes Mail, NotesView, SmartSuite, and Word Pro are registered trademarks of Lotus Development Corporation. cc:Mail is a trademark of cc:Mail, a wholly-owned subsidiary of Lotus Development Corporation. IMS is a trademark and AIX, AS/400, CICS, DB2, IBM, OfficeVision, and OS/2 are registered trademarks of International Business Machines Corporation. SAP and R/3 are registered trademarks of SAP AG. Soft-Switch is a registered trademark of Soft-Switch, Inc., a wholly-owned subsidiary of Lotus Development Corporation. Other product and company names mentioned herein may be the trademarks or registered trademarks of their respective owners.
Contents
Chapter 1 Planning the Domino System . . . . . . . . . . . . . . 1
Using Lotus Domino . . . . . . . . . . . . . . . . . . . . . 1 Domino as a business solution ............. 2 Using Planning the Domino System . . . . . . . . . . . 3 About using Lotus Web sites to locate additional information . . . . . . . . . . . . . . . 4 About using NotesBench statistics with Domino Server.Planner . . . . . . . . . 15 Planning for Domino on the Internet . . . . . . . . 16 Planning a Domino intranet . . . . . . . . . . . . . . 17 Planning for Domino clients . . . . . . . . . . . . . . 17 Planning for rolling out Domino in a workgroup . . . . . . . . . . . . . . . . . . . 18 Upgrading to the new software . . . . . . . . . 18 Using Domino in daily activities . . . . . . . . . 19 Deploying the software . . . . . . . . . . . . . . . . 19 Planning a pilot project for Domino . . . . . . 19 Supporting the Domino deployment . . . . . . . . 20 Planning for Domino administration . . . . . . . . 21 Planning for security . . . . . . . . . . . . . . . . . . . . 23 Naming conventions and requirements . . . . . . . . . . . . . . . . . . . . . 24 Guidelines for naming a Domino server . . . . . . . . . . . . . . . . . . . . 25
Contents iii
About mail on your intranet . . . . . . . . . . . . . . 54 Pushing information to your users . . . . . . . . . 54 Scaling your Domino intranet . . . . . . . . . . . . . 55
About planning replication policies . . . . . . . . . 76 About replication conflicts . . . . . . . . . . . . . . . . 76 About save conflicts . . . . . . . . . . . . . . . . . . . . . 77 About monitoring replication . . . . . . . . . . . . . 78 Deploying the Public Address Book . . . . . . . . 78 About improving Public Address Book performance . . . . . . . . . . . . . . . . . 80 Improving the lookup time . . . . . . . . . . . . . 80 Improving performance of the Administration server . . . . . . . . . . . . . . 80
. . . . . . . . . . 93
. . . . . . . . . . . . 93
Inbound Session Handler(s) . . . . . . . . . . . . 93 Delivery Report Task . . . . . . . . . . . . . . . . . 93 About databases that the SMTP MTA uses . . . . . . . . . . . . . . . . . . 94 SMTP mail box (SMTP.BOX) . . . . . . . . . . . 94 Outbound work queue (SMTPOBWQ.NSF) . . . . . . . . . . . . . . . . 94 Inbound work queue (SMTPIBWQ.NSF) . . . . . . . . . . . . . . . . . 94 MTA Tables database (MTATABLES.NSF) . . . . . . . . . . . . . . . . 94 MTA Forms database (MTAFORMS.NSF) . . . . . . . . . . . . . . . . 94
About configuring the SMTP/MIME MTA . . . . . . . . . . . . . . . . 95 Preparing to configure the MTA . . . . . . . . . 95 Using the Ping utility to test connectivity . . . . . . . . . . . . . . . . . . . . . . 96 About connecting SMTP/MIME MTAs . . . . . . . . . . . . . . . 96
. . . . . . 87
About deploying mail . . . . . . . . . . . . . . . . . . . 87 About deploying Domino as a mail server . . . . . . . . . . . . . . . . . . . . . . 88 Planning mail routing in a Domino system . . . . . . . . . . . . . . . . . . . 88 About mail routing and the Internet . . . . . . . . 90 How mail travels between Notes and the Internet . . . . . . . . . . . . . . . . . . . 90 How mail travels from the Internet to Notes . . . . . . . . . . . . . . . . . . 91 About the components of the SMTP MTA . . . . . . . . . . . . . . . . . . . . . . 92 Add-in Controller . . . . . . . . . . . . . . . . . . . . 92 Outbound Message Conversion . . . . . . . . . 92 Outbound Session Controller . . . . . . . . . . . 92 Outbound Session Handler(s) . . . . . . . . . . . 93
About connecting one SMTP/MIME MTA directly to the Internet . . . . . . . . . . . . . . . . . . . . . 97 About accessing the Internet through a firewall or other mail relay . . . . . . . . . . . . . . . . . . . . . . . 100 Example: Accessing the Internet through a firewall or other mail relay system . . . . . . . . . . . . . . . . . . . . . 100 About accessing the Internet through a firewall with Intranet messages delivered directly . . . . . . . . . 101 About using one MTA for Internet messages and one MTA for Intranet messages . . . . . . . . . . . . . . . . . 105 About mail routing and domains . . . . . . . . . 110 About mail routing and multiple Public Address books . . . . . . . . . . . . . . 111
Contents v
Separate Public Address books . . . . . . . . . 111 Directory assistance . . . . . . . . . . . . . . . . . 111 Cascading Public Address books . . . . . . . 112 Summary of methods for managing multi-domain Public Address books . . . . . . . . . . . . . 113 Mail routing within a Domino named network . . . . . . . . . . . . . . . . . . 113 Mail routing between Domino named networks . . . . . . . . . . . . . . . . . 114 About server connections for mail routing . . . . . . . . . . . . . . . . . . . . . 114 About mail routing and priority levels . . . . . . . . . . . . . . . . . . . . 115 About mail files . . . . . . . . . . . . . . . . . . . . . . . 115 About accessing mail from Internet clients . . . . . . . . . . . . . . . . . . . 116 About shared mail . . . . . . . . . . . . . . . . . . . . . 116 About accessing mail from MAPI clients . . . . . . . . . . . . . . . . . . . . . 116 Setting up the Calendar and scheduling across your organization . . . . . . . . . . . . . . . . . . . . . 117
About hierarchical naming . . . . . . . . . . . . . . 124 Verifying identities . . . . . . . . . . . . . . . . . . 124 Organize the company . . . . . . . . . . . . . . . 125 About Domino server security . . . . . . . . . . . . 127 About Web browser client security . . . . . . . . 128 About Notes client security . . . . . . . . . . . . . . 128 About database security . . . . . . . . . . . . . . . . 130 Access levels . . . . . . . . . . . . . . . . . . . . . . . 130 Permissions . . . . . . . . . . . . . . . . . . . . . . . . 130 Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 About database encryption . . . . . . . . . . . . . . 131 About controlling access to database design elements . . . . . . . . . . . 132 About mail security . . . . . . . . . . . . . . . . . . . . 133
Internet activity tracking . . . . . . . . . . . . . . 122 Notes client . . . . . . . . . . . . . . . . . . . . . . . . 122 About network security . . . . . . . . . . . . . . . . . 122 Guarding against unauthorized access . . . . . . . . . . . . . . . 122 Guard against viruses . . . . . . . . . . . . . . . . 123 Guard the physical system . . . . . . . . . . . . 124 vi Planning the Domino System
Improving AUTOEXEC.NCF . . . . . . . . . . 145 About improving OS/2 Warp server performance . . . . . . . . . . . . . . . 146 Choosing a file system . . . . . . . . . . . . . . . 146 Disk swapping . . . . . . . . . . . . . . . . . . . . . 147 Disk caching . . . . . . . . . . . . . . . . . . . . . . . 147 Configuring memory . . . . . . . . . . . . . . . . 148 Configuring your disk . . . . . . . . . . . . . . . 148 About improving Windows NT and Windows 95 performance . . . . . . . . . . 148 About improving UNIX server performance . . . . . . . . . . . . . . . . . . . . . 149
Index . . . . . . . . . . . . . . . . . . . . Index-1
Contents vii
(HTTP), HyperText Markup Language (HTML), and Network News Transfer Protocol (NNTP). Domino Internet security includes support for the Secure Sockets Layer (SSL) protocol and X.509 certificates. You can use your existing Internet infrastructure with Domino and be assured that your system works with other systems based on open protocols. The Domino server for the Web is available on a number of platforms, including IBM OS/2, Microsoft Windows NT, Novell NetWare, and several types of UNIX operating systems. The Domino server is available in two configurations: the Lotus Domino 4.6 Mail server, a complete messaging server, and the Lotus Domino Web server, which combines the messaging functionality of the Domino Mail server with the power of Internet and intranet application development. Upgrading from the Domino Mail server to the Domino Web server is straightforward. Domino makes developing applications that automate business processes easy. For an organization with heterogeneous platforms and operating systems, use the seamless cross-platform design of application databases created with the Lotus Notes Designer for Domino client. With the Notes Designer for Domino client, you can create applications from a GUI with no knowledge of programming or scripting languages. Templates make setting up and configuring applications out of the box fast and easy. Applications on Domino can route information automatically, alert users that an item is overdue or needs attention, exchange information with enterprise software like relational databases and transaction processing systems, and push information to user desktops. Domino supports a wide variety of clients: the Notes client, the most feature-rich client available; POP3 and IMAP clients such as Lotus Mail and Qualcomm Eudora; NNTP clients such as Internet news readers; Internet browsers such as Microsoft Internet Explorer and Netscape Navigator; and LDAP clients.
databases, and knowledge-archiving capabilities to your organization. To achieve greater efficiency and closer ties with other organizations, such as suppliers and distributors, create a Domino extranet to allow them controlled access to information in your organization. Domino integrates with other knowledge systems, including: Enterprise information systems such as SAP R/3, transaction processing systems such as Tuxedo and Tandem, and relational databases such as Oracle and Sybase with Domino.ConnectTM Document management and control systems through Domino.Doc Office productivity suites such as Lotus SmartSuite and Microsoft Office Intranet push technology such as PointCast with Domino.BroadcastTM Online commerce systems such as CyberCash with Domino.MerchantTM Network computers Domino provides a single security and administration point for your data and gives users a consistent interface; users see information from a system like SAP R/3 presented the same way they see data from the Internet or from a database. Applications hosted on Domino leverage this access to information with sophisticated workflow automation capabilities. For information on applications, see the Lotus Notes Designer for Domino Application Developers Guide. For more information about products like Domino.Connect, Domino.Doc, Domino.Broadcast, and Domino.Merchant, see the Lotus Web site at http://www.lotus.com.
http://support.lotus.com contains support information on Lotus products, including common questions and solutions, user discussions, downloadable files, and Lotus support phone numbers. You can also use this Web site to search the KnowledgeBase for technical information on Lotus products. http://www.lotus.com/notesmta contains information on Lotus Notes Messaging Services, which allow Domino administrators to set up mail routing from different mail systems. These Messaging Services include message transfer agents (MTAs), such as the SMTP/MIME, cc:Mail, and X.400 MTAs. http://www.lotus.com/systems contains information on systems management and software distribution utilities you can use to manage Domino and Notes. http://www.lotus.com/contacts contains telephone numbers, e-mail addresses, and mail addresses to use when you need to contact Lotus. http://www.support.lotus.com/css/feedback.htm lets you provide feedback and suggestions for Lotus products. Lotus uses these suggestions to help plan and improve Lotus products. To access information on the Web, you must use a Web browser, such as the Web Navigator. If you need information on connecting your Notes workstation to the Web, see your server administrator.
How does my organization communicate? Is information flow voice-based (telephony and voice mail), paper-based (memos, letters, faxes), or computer-based (e-mail, discussion forums, document sharing)? If we use a combination of these methods, what is the rationale for each method? How should my organization communicate? For computer-based communication, what is the backbone of this system (for example, LAN, WAN, Internet)? How easily do different groups connect electronically? What connections exist to the systems of customers, partners, and suppliers? How efficient and reliable are these connections? How does my organization handle remote and mobile communications? How does my organization guarantee 24x7 reliability for mission-critical software applications and hardware? How does my organization ensure secure communication? How do we ensure the security of a Web site and of activities that occur on it (for example, information exchange via forms, electronic commerce)? How does my organization use the Internet? If it has a Web site, how do we maintain that site and ensure that information is up to date? How do we communicate via Internet messaging?
Upgrade to Domino
Consider how to upgrade to Domino from your existing systems. How will you convert your directory information and e-mail files to Domino? If you use an Internet mail system, the conversion should be seamless, as Domino supports Internet standards such as MIME, POP3, IMAP, LDAP, HTTP, and HTML. If you use a LAN-based or mainframe system, plan the conversion process more carefully. Your organization will have to use both Domino and your existing system during a transitional coexistence period. Lotus offers a number of upgrade paths to Domino and has tools such as the Microsoft Mail conversion kit to assist you in this process. For details and more information, visit the Lotus web site at http://www.lotus.com/migration. Domino can replace other systems and processes. You can automate business workflow in ways that obviate other systems, including paper-based routing. With the integrated Notes Web Navigator, you can move from other browsers to Domino. By using additional Domino solutions, such as Domino.Doc, you can replace systems like document management software. The advantage to this is having a single software, object store, and user interface to access and manage your organizations information. Domino can act as the nexus for your company the single resource for finding information, whether that information resides on the Web, in a relational database, or in an e-mail message. You can also move information that exists in other forms paper, magnetic tapes, voice mail, other databases into databases hosted on Domino. Domino lets you store images, sounds, file attachments, HTML, Web pages, and many other types of information in these databases. Domino includes templates for databases that act as libraries for other types of information, such as Lotus SmartSuite documents and Microsoft Office documents.
Create a process for converting information stored in other formats into databases and for notifying users where the new information is located. Maintain these pointers to the new location of the information after the conversion process is finished; people who use the information sporadically will need guidance in the future. Consider establishing a database that tracks where information has moved; users can check this database if they cannot find data. Help your users make the transition to Domino. Have them use databases, e-mail, calendar and scheduling, and other Domino features.
Fault tolerance Look at which areas and applications are mission-critical. Do you have 24x7 access to these resources? How do you guarantee access? Domino Advanced Services can be used to provide failover and fault-tolerance support for Domino servers. Remote and mobile use Look at which users need to access Domino when not connected to your network. Do you have adequate modems and remote servers available? Are your modems fast enough to handle replication via phone lines? How will remote and mobile users obtain support? Internet access Look at how you access the Internet. What type of connection do you need? What kind of security will you set up? Where should the connection point to the Internet be located? Create a map of your organizations information systems infrastructure. Include server locations, network connections, routers, firewalls, proxies, protocols, external access points, Internet access points, and data stores. This site map helps you plan where to locate Domino servers and decide on a Domino server topology. Use the map to consider how to route mail, set up replication between servers, and create remote connections for users. As you examine your present infrastructure, think about your future needs. Will the infrastructure still work? How will you expand your capacity? By factoring growth and change into your deployment plan, you ensure a smooth transition in the future. For more information on integrating Domino into your network, see Configuring the Domino Network.
When you plan for server capacity, use the following table as a guide for how many active sessions a server supports with a given protocol. Because a Domino server reuses sessions it finds are inactive, the number of users connected to a server at any given time can exceed the numbers in the table; these are the recommendations for active sessions. Server capacity depends on how many processors it has, their speed, and how much RAM the server has. For information about optimal server configurations, consult your hardware vendor and the NotesBench statistics for the server.
OS/Protocol OS/2 TCP/IP Server capacity IPX/SPX Server capacity NetBIOS 100 VINES AppleTalk X.PC 64 ports X.25 64
50. Greater 50 than 50 with Banyan VINES patch 5.54(20) not applicable Server capacity, not applicable on Digital Alpha not applicable not applicable not applicable not applicable not applicable not applicable 255
64 ports 64 ports
not applicable 64
AIX
Server capacity
Server capacity Server capacity Server capacity Server capacity Server capacity
not applicable not applicable not applicable not applicable not applicable
not applicable not applicable not applicable not applicable not applicable
Solaris (SPARC) Server capacity Solaris Intel Edition HP-UX NLM Server capacity Server capacity Server capacity
hardware options. You can add the latest specifications from hardware manufacturers to your testing by downloading specs from the Internet. The specifications are signed Notes databases based on audited vendor tests of their hardware. Domino Server.Planner considers operating system parameters; Domino version; RAM; the number, size and speed of CPUs; disk I/O; the number and speed of communication ports; the number and speed of network adapters; and cost. The application tests a variety of Domino tasks and workload levels against different server configurations. You can set the minimum acceptable performance levels for connection time, variability, and query tolerance. The application considers performance based on replication and mail routing. Server.Planner offers evaluations based on average response time and the percentage of queries that fall into various response time intervals. Using Lotus Components, you can graph results and share them with others via e-mail. Server.Planner runs on any Notes 4.5 or later client. You can use Server.Planner with the NotesBenchTM reports provided by hardware vendors to determine what hardware to purchase to optimize your Domino system. With Server.Planner and an estimate of your organizations needs, you can preview how various server configurations will work. By calculating the response times and reliability you need from each server and your total need for server capacity, you can estimate the number, type, and configuration of servers you need to have. To download server planner, visit the Lotus Notes.Net site at http://www.notes.net/down.nsf/welcome.nsf and select to download Server.Planner.
Web site navigation Look at how users will reach pages and how your site will guide them to the content they are looking for. How will the site provide context for a user who reaches a page from a Web search engine? How will you guide users back to their starting point? Can you provide a constant visual hierarchy or map? Web site search Look at how you will let users search the contents of your Web site for terms, phrases, and items. Internet mail access Look at how you will set up Internet mail access. Domino includes the Lotus Domino SMTP/MIME MTA (Message Transfer Agent) to route Internet mail and make it available to Notes clients. For more information, see Chapter 5.
With the new capabilities of Notes, users can integrate other software like office suites into their Notes tasks. Notes Active Document support allows users to create documents like spreadsheets or presentations and then share them with others using Notes workflow and security capabilities. For more information, see Chapter 9.
Depending on how older data is stored, you may want to migrate it to the application or enable the application to access the older data. The Domino solution for enterprise data, Domino.Connect, accesses information stored in relational databases, enterprise information systems, and transaction processing applications.
their concerns. Invest in additional resources to support their transition to Domino and to capture their experiences and feedback for use in planning your organizational deployment. Think of a pilot project as a beta release of your deployment plan it allows you to test your plan under actual business conditions and to work out any issues before moving to a company-wide rollout. Pilot projects may not be necessary for smaller companies, who have fewer issues regarding scalability, and for companies who need to deploy Domino quickly. Even without a pilot project, capture feedback and experiences to evaluate and modify your deployment strategy as you move through it.
The need for support will be high as users learn how to use Domino and should decrease after this acclimation period. Consider this high-traffic period in your plan for deploying Domino. You may want to have different parts of your organization transition to Notes and Domino at scheduled intervals for example, your IS department could move and learn the software first, followed by Sales one week later, followed by Finance one week after that, and so on. As an alternative, you may wish to increase the size of your IS department temporarily to meet the additional demands of a rollout. Many companies use databases on Domino to track calls to IS and the status of these calls as analysts handle them. Using a database increases familiarity with the software and brings the power of Domino to bear on the complex tasks of tracking, routing, and archiving calls along with the challenge of locating technical information and solutions. In addition, create a mail-in database where users fill out forms for less urgent problems and requests, such as certification requests and hierarchical name changes. The database can automatically route requests to the proper IS analyst, increasing the efficiency of the system. Consider creating a KnowledgeBase or FAQ (Frequently Asked Questions) database with answers to common questions and problems as well as procedures for contacting support. Users can access this database before calling support, decreasing the workload for your IS analysts. Remember to plan for support as you increase the size or complexity of your Domino system. If you add new employees to your organization who will use Domino or if you increase greatly the number of databases and applications on your system, consider the need to support problems with and questions about these changes.
About administration tasks Plan for the following administration tasks as you consider personnel for your rollout: Registering new users You must create Person documents and mail files for new users and enter information about the users in the Public Address Book. New Notes users require Notes IDs. Registering new servers You must create server IDs and set up connections, replication, and mail routing for new servers. Maintaining the Public Address Book You must update the documents in the Public Address Book and remove obsolete documents. Scheduling, managing, and troubleshooting replication You must set up replication between servers to keep databases current. The complexity of this task varies with your network topology. Scheduling, managing, and troubleshooting mail routing You must set up mail routing between servers to ensure timely communication. Mail routing is a task similar to replication, but involves routing between different Domino named networks and domains. The complexity of this task varies with the number of domains and Domino named networks in your organization. Lotus recommends you use only one domain for your organization, unless your organization is very large. Using more than one domain requires one of the following: Using a Master Address Book Using cascading Address books Appending domain names to e-mail addresses In addition, mail routing requires monitoring dead mail and tracing the path of mail that fails to be delivered. Setting up and maintaining calendars and schedules You must set up the Schedule Manager, Calendar Connector, and Resource Reservations database if you want to use the calendar and scheduling features in Domino. Setting up, updating, and ensuring security You must create and maintain a secure Domino environment. This involves software, hardware, and networking considerations. You must manage ID files, ACLs, server access lists, Deny lists, encryption, and electronic signatures.
22 Planning the Domino System
Setting up and maintaining remote access You must make sure remote and mobile users have access. Monitoring system usage and problems You must track statistics in the log file to determine the level of system use and system problems. This alerts you to a need for more servers, more hardware, or better distribution of system tasks. Maintaining databases You must update and maintain Domino databases, including updating designs and full text indexes, and resolve database issues. Ensuring system access You must make sure critical hardware and software applications are available to users. If necessary, use the clustering feature of Domino Advanced Services for failover. Troubleshooting You must solve problems as they arise, track their causes and resolution, and work to prevent their recurrence.
Notes and client security Notes and client security looks at preventing unauthorized actions on your workstation and controlling access to local data and Domino servers. Application security Application security looks at controlling access to database applications and making sure data can only be viewed by authorized individuals. Document security Document security looks at controlling who can create and access documents in a database. Field security Field security looks at controlling access to fields on a document containing sensitive or confidential data. Mail security Mail security looks at making sure messages cannot be viewed by anyone other than the intended recipients and at validating a senders identity. For information, see Chapter 11.
Domino server names are unique names that identify servers in a domain. Server names can consist of one or more words (a maximum of 79 characters) and can consist of any characters except: parentheses, at (@), slash and backslash (/ and \), equal (=), and plus (+). Using spaces is not recommended. If you use spaces, you must enter that server name in quotes () when entering a command at the server console.
Use Lotus Components, enhanced ActiveX controls, to insert charts, graphs, drawings, and spreadsheets directly into a Notes document. Let users work in one environment to accomplish their tasks. Domino.Broadcast then lets you push information in real time to users desktops. Send corporate reminders, updates, and questions to users. By clicking a headline or announcement, users access further information from a database. For example, you send a reminder about updating benefits information; when employees click the reminder, Domino opens a Human Resources database and presents them with a form to fill out and update their benefits. For information on deploying a Domino intranet, see Chapter 6. For information on Domino.Broadcast, see the Lotus Web site at http://www.net.lotus.com/action4/broadcast.nsf.
Enterprise Application Systems Domino.Connect links to enterprise application systems such as SAP R/3 via a LotusScript BASIC plug-in based on both Remote Function Calls and the SAP R/3 Business API. This plug-in allows bi-directional data exchange and is capable of both synchronous and asynchronous activity. The Plug-in module encapsulates the SAP C-API into LotusScript classes, giving LotusScript programmers an object-oriented framework for calling R/3 function modules through RFC to exchange data bidirectionally with SAP R/3. You can perform this exchange synchronously or asynchronously. Lotus programs can call any R/3 ABAP/4 program registered as a remotely callable function, including the R/3 Business Application Programming Interfaces (BAPIs). Transaction Systems Transaction systems manage the information necessary for purchasing, ordering, and billing in large organizations such as credit card issuers. Domino.Connect applications access more than 18 different platforms and systems via the MQSeries link plug-in from IBM, including AS/400, CICS, Digital, IMSTM, ISAM, HP-UX, Tandem, Tuxedo, and VSAM systems. Domino.Connect includes a Human Resources self-service application allowing users on Notes clients and Web clients to perform standard human resource functions such as hiring, promotions, terminations, and transfers using ODBC. You can modify Domino.Connect to use SAP R/3 or other products in this application. Domino.Connect also includes a self-service corporate purchasing application that provides a Notes-based UI with product catalogs, an order form, and integration with an ODBC database containing product catalog information and order information. You can modify Domino.Connect to use SAP R/3 or other products in this application.
You create a catalog of products and publish it on the Web. Domino.Merchant maintains the catalog, registers site visitors, accepts and processes orders, and handles online payments using credit cards, purchase order, or CyberCash wallet. Security is assured through SSL and CyberCash. Your online store can interface with banks via CyberCash; for security, Domino.Merchant uses a 768-bit RSA algorithm for security. Domino.Merchant can calculate taxes and shipping costs using tables you define. The software generates orders and delivery information and routes orders to external systems. Visitors to your Domino.Merchant site use a virtual shopping basket, allowing them to add and remove items, review and modify the contents of the basket, and even leave the site and return the basket is stored in the system. Repeat customers can access their account information and order history. You can allow anonymous shoppers or require visitors to register upon entering the site.
Using templates
You can create out-of-the-box applications by using templates, standardized applications that you customize to provide desired functionality. Domino includes application templates for discussion databases, document libraries, Notes Web Navigators, approval cycles, billing, database catalogs, database analysis, Internet search sites, project management, resource reservation databases, and statistics collections.
Programming support
Database applications, with their embedded LotusScript programming language, @formulas, and @commands, have enormous power and flexibility for programmers. Domino supports: Lotus C API (Application Programming Interface) Provides a set of subroutines and data structures to create programs that access databases.
33
Lotus C++ API Provides a set of C++ classes that allow programs to access databases. Lotus HiTest C API Offers a C interface that is faster and requires less code than the C API. LotusScript Extensions Toolkit Expands LotusScript functionality and lets programmers create extensions (custom modules) that load separately and implement one or more LotusScript classes. LotusScript Provides a BASIC scripting language with language extensions allowing you to do object-oriented application development. LotusScript interacts with Domino through defined object classes. NotesSQLTM Provides an ODBC driver enabling ODBC-compliant DBMSs and data query tools to access Domino information. Lotus NotesPumpTM Lets you create scheduled, event-driven, or on request bi-directional data exchange between data systems including IBM DB2, Notes, Oracle, Sybase, and ODBC databases. Lotus Components Provide ActiveX controls you can use to create and enhance applications. Lotus Notes Global Designer Lets you create databases in multiple languages and streamlines maintaining them. LotusScript Data Object Lets you read and write data from Domino to external ODBC data sources using LotusScript. Lotus BeanMachine for Java Lets you create and publish Java applets and JavaBean components in a visual authoring environment. Java agents on the Domino server For more information on Domino application development tools, see the RoadMap to Lotus Notes Application Developers Documentation and visit the Lotus Developer Central Web site at http://www2.lotus.com/developers/ tools.nsf/.
Full text indexing When databases on a server require frequent full text indexing, performance may suffer during heavy usage. Try changing to a lower priority indexing time on databases, for example, from immediate to hourly, or from hourly to daily. You can also change scheduled indexing to lower usage times. When full text indexing a database, use the Whole Word and Case-Insensitive features to use the fewest resources. If you plan to full text index a database, consider that protecting documents in a view with read or edit lists or roles slows down the retrieval process. Database maintenance Check databases for corrupted documents. Compact the databases after many deletions and modifications. Database size increases with additions and does not decrease until you compact it. Databases below 90% of capacity may see performance improvements from compacting, but be aware of the time it takes to compact a large database. When using the option Store form in document, use a mail-in agent to remove the $Body field(s) in a document as it arrives in its destination database. Keep one copy of the form in the destination database to view the documents. This saves disk space and improves the performance of the database. For more information on maintaining databases, see Chapter 5 in Maintaining the Domino System.
Can users access a database in the most cost-effective way? If the user can access an existing version of the database across a LAN, you may not need to create replicas. If a group of users accesses the database across a WAN, it is probably more cost-effective and performance-effective to create a replica of the database on a local server for that group. Is a heavily used database overloading a server? To improve performance, create a replica of the database on another server. Consider clustering the server to balance workloads. Is the database easily accessible in larger organizations or from the Internet? Consider where to place replicas of the database to ensure accessibility and balance server workloads. Do users need real-time information? Because replica copies of a database are almost always out of sync with the latest information, users who need access to real-time data should access a single original database. If this is not possible, consider clustering several Domino servers. Clusters provide real-time information for both original databases and replicas. Are users putting heavy demands on only certain parts of a database? Use selective replication to replicate particular views or documents. For information on using selective replication, see Chapter 5 in Getting Started with Domino. For information about Domino server clusters, see Chapter 9 in Extending the Domino System.
Internet security Domino provides unmatched Internet security by controlling who can access servers, databases, and database elements, and who can perform certain actions in a Web site or database. For example, you can have one access level at your site for all users yet restrict access to parts of your Web site, such as the product discussion databases, to the individual users who are authenticated with a name and password. Domino uses Secure Sockets Layer (SSL) v3.0 to encrypt and protect transactions between Internet users and Domino servers. In addition, Domino can validate X.509 certificates and can act as a Certifying Authority (CA). Extranets Domino makes it easy to set up an extranet that makes part of your intranet information available outside your company. Use a Domino extranet to make information available to customers, vendors, suppliers, consultants, and others in a controlled, secure fashion. For more information on using Domino for messaging, see Chapter 10. For more information on security, see Chapter 11.
Sites created with Domino tools are template-based, making it easier and faster to create and customize your Web pages. You can also standardize the look of your site using templates by including the same design elements and graphics in the template for each area of the site. This gives your site a consistent, distinct appearance. Domino sites are inherently cross-platform; you can design them on one platform and run them on another. Domino tracks page creation and edit dates, allowing you to tell how long a page has been on your site and the last time it was updated. With full text search capability, Domino lets users find specific information on any part of your site that is accessible. For more information about Domino security, see Chapter 11.
Security Determine what level of access you want to allow to your Web site and to your servers. A read-only Web site would not allow users to send information by entering it on a form; an interactive site would give general users access to create forms and other documents and could give registered users other permissions. Consider which ports to open in your firewall. For more information, see Chapter 11.
How do people in your organization access mail? People may need to access mail from a Notes client, from a Web browser, from a POP3 or IMAP client, or from a combination of these clients. Use Domino to combine mail from the Internet and your intranet into a single file accessible from multiple clients. In addition to Notes mail files, Domino hosts Internet mail files for POP3 and IMAP clients and allows access to your Notes mail file via these protocols. You can also access your mail from a Web browser by using the Notes Web mail template, which allows access to Notes mail, calendar and scheduling features, and task management from a browser. Domino supports mail files from a number of profiles. How do people inside and outside your organization access directory information? You can make the Public Address Book information available or use LDAP to make directory information accessible. Domino supports LDAP (Lightweight Directory Access Protocol) for accessing the Public Address Book. LDAP allows a common means of access for clients, applications, and servers. With LDAP, you can look up entries in a Public Address Book, an LDAP server on the Web, or a public resource like 411 or Bigfoot. Users in your organization can access your Public Address Book from a browser as easily as from a Notes client. Consider carefully which LDAP or Public Address Book fields you want to make available to employees and to people outside your organization. How do you guarantee access to e-mail and directory information? If e-mail is critical to the success of your business, make sure that employees can read and send mail at all times. With Domino Advanced Services, you can make sure that e-mail and messaging are always available to your organization. The clustering and failover features in Domino Advanced Services allow you to group two or more servers, which replicate their contents in real time as they change, and configure this server cluster so that if one server fails, other cluster servers take over for it. Clustering is invisible to users. You can cluster several mail servers so that if one server malfunctioned or had to be taken offline, the other servers would send and deliver mail. How do people in your organization share knowledge? Some organizations use e-mail to share information; others use NNTP newsgroups or discussion databases. Depending on how your organization makes knowledge available, concentrate server resources on e-mail, newsgroups, or other knowledge management systems.
Built on standards
The SMTP/MIME MTA is based on Internet Request for Comments (RFCs). Among the RFCs supported are: RFC821 Simple Mail Transfer Protocol RFC822 Standard for the Format of ARPA Internet Text Messages
RFC1521 MIME: Part I (message bodies) RFC1522 MIME: Part II (message headers) RFC974 Mail Routing and the Domain System RFC1123 Requirements for Internet Hosts - Application and Support
What do you want the general Internet e-mail address for your organization to be? The Domino LDAP server uses the Global Domain record in your Public Address Book to add the proper address to a users Internet name. What level of LDAP security do you want? LDAP security adds to the Domino security model. You can allow LDAP users individual access beyond the anonymous access for users not in the Public Address Book.
Personal interest profiles Consider working with users to set up personal interest profiles that notify them of documents they may be interested in. Staff You may need a newsgroup administrator responsible for replicating content to and from Internet newsgroups and for monitoring newsgroup activity and postings.
49
Lotus Word Pro or Microsoft Word as your e-mail editor; the Notes Web Navigator, Microsoft Internet Explorer, or Netscape Navigator as a Web browser; and Notes as e-mail access to Notes Mail, POP3, or IMAP mail files. A browser - Internet mail - Domino server intranet is simple to set up and learn. However, developing applications for an HTML-based system is difficult; you must create them with a programming language and can deploy them only on the TCP/IP protocol. Working offline is difficult or impossible. Internet mail does not have the features of Notes mail such as rich text, shared mail, replication, delivery reports, priority levels, automatic iterated routing to multiple recipients, integrated calendar and schedule management, and automatic addressing. Since browsers access data via a Universal Resource Locator (URL), your organization must track and manage these links and make a directory of them available to users. Browsers lack the integration with other productivity software, such as office applications, that Notes offers. In addition, the browser security model is not as robust as the Notes client - Domino server RSA public-private key system. A mixed intranet, with both Notes clients and browsers, blends the two approaches. You can create applications with Notes and use both Notes mail and Internet mail. Domino converts Notes applications to Web applications with no user action necessary. While not as rich in features or security as a Notes client - Domino server intranet, the mixed approach may be best for organizations with different levels of need for intranet functionality. For example, a retail clothing company sets up an intranet with browsers accessing applications on Domino in stores and with Notes clients for headquarters and all regional offices. Sales representatives enter data, query inventories, and send e-mail from the browsers, while administrative employees and managers use the Notes clients to design applications, create reports, and manage the business. Consider the following issues when deciding on an intranet type: What level of functionality do you need? The three types of intranets have different functionality levels based on the features of their client software. A Notes client - Domino server intranet has the greatest functionality, incorporating e-mail, calendar and scheduling features, integrated Internet access, access to Notes applications, and integration with other productivity software. A browser client - Domino server intranet has less functionality, and a mixed intranet has capabilities midway between the other two types. Decide how much functionality your organization needs in each area and in each group.
If there are several levels of needed functionality, who needs each type? Your organization may need different capabilities in different areas. For example, a transportation company needs basic access to applications, information in databases, and e-mail for most employees, with more advanced capabilities for administrators, intranet application designers, and managers. The company deploys Notes clients to personnel who need greater functionality and browser clients to other employees. Do employees need to work offline? If employees travel often or are frequently disconnected from your network, they may need to work and be productive offline. The Notes client is designed for offline use by incorporating replication and locally stored database replicas. Browsers cannot effectively work offline without software like Lotus WeblicatorTM. If employees need to work offline with intranet applications and e-mail, consider Notes clients. What software does your organization already have? Your organization may want to use software that the company already has, or it may want to upgrade. For example, a company using browsers and Lotus Mail as a POP3 client decides to implement a browser Internet mail - Domino server intranet, with plans to upgrade to Notes clients over time.
For example, you use a single database to hold sales information about current opportunities at a company, the history of past transactions and relationships, key contact names, and information critical to a sale. By centralizing this knowledge, you allow your entire sales force to use it in customer relationships, increasing your success. Domino databases and messaging make the concept of a virtual team a reality. Use replication and e-mail to communicate among colleagues who are distant geographically. Domino manages document information, allowing you to distinguish revisions, distinguish recent changes from older ones, and enter comments. Use the Calendar and Scheduling features of Domino and the Notes client to schedule meetings, reserve rooms and resources, send announcements, and give others information about the free and busy times in your schedule and theirs.
Intranet security
To ensure the security of your intranet, consider the following: How will you protect your intranet from unauthorized external access? Set up a firewall between your intranet and other intranets, and your intranet and the Internet. Consider which ports in the firewall need to be open and in which directions. Close all other ports. Do you want to allow remote or external intranet access? Regulate and monitor remote and external access to your intranet. This helps you determine what resources are needed for remote and external access and to catch security violations. How will you authenticate intranet users? Set the Server access list in the Server record for each Domino server in your Public Address Book to allow access only to users certified by your company for Notes ID files. You should give users interacting with Domino from a browser a user name that ends with the certification of your company; for example, John Smith/SALES/ACME. How will you control access to intranet information? Set access control lists on your databases carefully. Consider the level of access needed to the database for different groups. If only a select group needs access to a database, add them explicitly to the ACL and make the Default ACL entry No Access.
How will users access intranet information? Consider the level of access you need Web browsers to have to your databases. If only Notes clients access the databases, set the Maximum Internet name and password access in the ACL to No Access. You may want to set this level to Reader so that browsers can read databases but only Notes clients can create or delete documents within them. This helps to further limit control over the contents of a database. What information needs to have restricted access or to be kept confidential? Set access restrictions for fields, views, forms, and documents that only selected people and groups should see. For example, you have a Human Resources database with benefit information for employees. All employees can read their benefits, but only Human Resources personnel can create documents for new employees. You give employees access to edit some fields to update personal information for example, to update the Number of Dependents field when a child is born. For more information, see Chapter 11.
Individual access requires specific entries in the ACL, either as individual names or as members of a Group. Groups are managed in the servers Public Address Book. You can have both general and individual access concurrently. For example, you have an extranet where the Job Postings database is accessible to everyone on the Internet or with a Notes client, but the Software Specifications database is accessible to a few external consultants. Using Notes security, you can have general and individual access to different elements within a single database. For more information, see Chapter 11.
61
national hub-spoke setup) for maximum efficiency or may have Ring replication between hub servers. Replication topology normally duplicates the overall server topology of your Domino system. Hub-spoke Establishes one central server as the hub and other servers as the spokes. The spokes update the hub server by replication and mail routing, and the hub in turn updates each spoke. Hub servers replicate with each other or with master hub servers in organizations with more than one hub. You create two Connection documents for each spoke server (spoke to hub, hub to spoke) and two for each hub to hub connection. Hub-spoke is generally the most efficient replication topology and minimizes network traffic, especially in larger organizations. Peer-peer Connects every server in your organization to every other server. This becomes unmanageable in organizations with more than a few servers, but does allow rapid updates in very small organizations. Binary tree Connects servers in a pyramid fashion: the top server connects to two servers below it, each of which connects to two servers below it, and so on. Information travels down the pyramid and then back up. Chain Connects servers one-to-one, end-to-end. Information travels along the chain and then back. Chain replication is less efficient than ring replication but is useful in situations where information only travels in one direction. Ring Connects servers in a circle; it is like chain topology with the ends connected. Cluster This is less a pattern than a way of ensuring server access. Use clustering where you must ensure constant access to data. Clustering is available as part of Domino Advanced Services.
The spoke servers send changes to the hub, which then sends changes back to the spokes. While there are six connections, the hub server performs the replication, reducing the load on the spokes. Hub-spoke replication has one Connection document for each hub-spoke connection, with the hub server as the source and the spoke server as the destination. With hub-spoke replication, you can standardize database ACLs with the hub as manager, limit access to the hub, minimize network traffic and maximize network efficiency, centralize replication administration and data backup at the hub, and improve server load balancing. However, network traffic increases on the hub LAN segment. If you have more than 25 servers per hub, establish tiers of hubs. If a hub goes down, replication for that hub and its spokes is disabled until the hub is repaired or replaced. Peer-peer With peer-peer replication, each server replicates with every other server. With the same four servers, replication looks like this:
1 with 2 2 with 3 3 with 4 1 with 3 2 with 4 1 with 4
This involves six replication connections to synchronize four servers but allows progressive updates of content. The potential for replication problems decreases because only two servers communicate for each replication, without hub or intermediary servers. However, peer-peer replication requires many Connection documents, increases administration since you must avoid overlap in replication schedules, and prevents you from standardizing ACL requirements.
Binary Tree Binary tree replication connects servers in a pyramid and is normally used in organizations with many servers. A server replicates with two servers beneath it; each of these servers replicates with two servers below it; and so on. Once information has reached the bottom of the tree, two servers at the bottom replicate with one server on the level above. This server and another at its level replicate with a server on the level above them, and so forth. With five servers, replication looks like this:
First level down to second Second level down to third Third level up to second Second level up to first 1 (top) with 2 2 with 4 4 with 2 2 with 1 (top) 1 (top) with 3 3 with 5 3 with 5 3 with 1 (top)
Information takes longer to replicate in binary tree replication than in hub-spoke replication and if one server goes down, all servers in that branch of the tree fall behind. Chain Chain replication is end-to-end replication of servers in a line. With the same four servers, replication looks like this:
1 with 2 4 with 3 2 with 3 3 with 2 3 with 4 2 with 1
This increases the time it takes changes to migrate to all servers. Ring Ring replication is similar to chain replication, but connects the ends of the chains, forming a loop. With the same four servers, replication looks like this:
1 with 2 2 with 3 3 with 4 4 with 1
MTA Route and convert messages between message formats. This is especially useful if you run Notes Mail on your LAN and communicate frequently outside your LAN via Internet mail. Application Host Notes applications. You can reduce the number of Connection documents in your system if these applications do not use mail, since replication only requires one Connection document while mail routing requires two. You can group applications by use, load, or functional area on the same server. Passthru Allow users to connect to other servers from one location. Passthru servers connect you to other servers through a single place without requiring you to know routing information for the servers. Remote users can dial in to a passthru server and connect to multiple servers without making additional phone calls. Passthru servers usually do not host applications or mail databases. Remote Let users access Domino via a modem. With a remote server, you do not need to install and maintain servers in remote locations. You can set up mail and application servers as remote servers. A remote server increases security by acting as a single secure point of entry. Billing Track and record activity for server sessions, replication, mail, database use, and document use. Use billing to charge internal or external sources for Domino server usage. Billing tasks on the Domino server transfer billing records to a billing database. You can retrieve billing data or send it to a binary file for integration into your organizations invoice process. Domino billing servers integrate with existing billing processes through APIs and third party applications. Billing is available as part of Domino Advanced Services. Gateway Connect Notes and foreign systems; for example, Soft-Switch. Some gateway servers convert Notes documents to another format. Backup Store critical information. If information is lost on your other Domino servers, you can restore it from the backup servers. In addition, you can copy replicas on backup servers to disk, tape, or other removable media.
Use Windows NT to create Notes Internet-only users. Assign users Internet mail when you use Windows NT to register them in Domino.
Does each server have access correctly set in the ACL of replicating databases? Servers check the database access control list (ACL) for each replicating database. The ACL determines what actions each server can perform upon the database. Access levels range from No Access, which does not allow the server to view or modify the contents of the database, to Manager, which allows the server to modify content in the database and the ACL. Checking the ACL tells the servers what content they can replicate and update. For example, a server with Reader access to a replica on another server can receive (read) updates from that replica but cannot send changes to that replica. Are servers replicating too frequently based on the information in the replication history? After determining what access each server has to the other servers replica, the servers examine the replication history of the database to find out which documents have changed since the last replication. Then the servers check the replication settings for the database to see which documents can replicate. The replication settings may only allow a subset of documents to replicate; for example, documents in a certain folder or documents which meet the criteria established in a formula. Have document authors prevented their documents from replicating? Servers check all of the documents that are eligible for replication to ensure that they have access to each document. Authors can restrict access to a document or a form (from which documents are created) with a Readers field that limits who can read the document. If there is a Readers field and the server is not listed in it, the server cannot replicate that document. For more information on replication, see chapter 5 of Getting Started with Domino and chapter 4 of the Database Managers Guide.
Use selective replication to replicate only certain items instead of automatically replicating an entire database. To save money on connection costs to remote sites, specify a time limit for replication in the Server Connection document. Keep the number of hops in a replication route to a minimum. The number of hops results directly from how you connect servers with Connection documents. Generally, when you get beyond a few servers, the most effective arrangement for servers is hub-spoke, where the hub initiates replication by calling the spokes and passing the replication data along. Because replication can affect response time on a server, limit replication on servers where users are attached. Heavy replication schedules should be restricted to dedicated replication servers or to hubs. Dont run server tasks such as AGMGR, UPDALL and UPDATE on a hub server. These tasks slow the server because they require CPU resources and affect most databases. Dont build or store full text indexes on a hub server. Full text indexes take up disk space and must be updated. Build and store full text indexes on spoke servers. Dont put hub servers in the same Domino named network as any other servers. Hub servers should not participate in mail routing and should not appear in a users Open Database dialog box. The server access list of a hub server should enforce these restrictions. When a replica is placed on a hub, it should be a complete replica. This allows spoke servers to selectively replicate from any hub server. Exceptions should be carefully managed. It is tempting to try to schedule replications at different levels of the hub-spoke arrangement to predict the movement of data up to the central hub and then back down to the spokes, but this does not result in any benefit. Each hub serves its spokes best by conducting a simple round robin schedule among them, repeating as often as practical. This distributes all data within a hubs sphere of influence as quickly as possible. An exception to hub-spoke replication is if you have a very large database (500MB or larger) that is supported on only two or three servers. In this case, the servers should replicate directly with each other so that the hubs do not need 500MB of space to support the database. In a tree structure, any problem with a hub server partitions the network into two pieces that dont communicate with each other. To alleviate this risk, have a backup server available and configure it so that it can be substituted for any hub server in fewer than 10 minutes. For more information, see Chapter 5 in Getting Started with Domino.
74 Planning the Domino System
conflict with a diamond next to the second document. You must resolve these conflicts by deciding which document version is correct. Copy the correct information into the main document and delete the second (and other) documents. You can avoid replication conflicts by: Selecting to merge replication conflicts in the Form Properties InfoBox Selecting to merge replication conflicts allows Domino to compare the fields of two documents that have a potential replication conflict. If the two documents do not have any changed fields in common (there are no fields which have been changed on both documents since the last replication), Domino merges the documents by updating each field with the latest information. If the two documents do have fields which have changed on each document, Domino creates a replication conflict. Dominos field level replication greatly reduces replication conflicts. Specifying a versioning option when creating a form You can further reduce conflicts by designing versioning into forms. This prevents conflicts by storing each iteration as a new version of the document. Using LotusScript to create a program to handle conflicts Assigning users Author access or lower so that they cannot edit documents
Server documents Domino creates a Server document for each Domino server in the domain. A Server document includes a servers public key and information on the domain, Domino named network, location, who can access the server, who can create databases and replicas on a server, server routing tasks, network and proxy configuration, message transfer agents, security, and Internet processes. Connection documents You create Connection documents to allow Domino servers to connect to replicate common databases and exchange mail. There are different Connection documents for remote, LAN, modem, and protocol connections. Certificate documents Domino creates a Certificate document for each certifier ID you create. The document lists the certifier name, which certifier created it, who to contact for certification, and contains a public key for the certifier. Group documents You create Group documents as lists of users, servers, and other groups who have a common characteristic, such as working on the same project or attending the same meeting. Use Groups in server access lists, e-mail addressing, and ACLs for greater efficiency. You can create several types of groups: e-mail only, ACL use only, server Deny list only, or multiple purposes. Assigning a group type simplifies views in the Public Address Book. Cluster documents Domino creates Cluster documents when you set up clustering using Domino Advanced Services. Cluster documents list the cluster name, cluster servers, cluster title, and cluster administrator. Configuration documents You create Configuration documents to manage and administer Domino servers remotely from the Public Address Book. Configuration documents set the NOTES.INI variables for a server, group of servers, or all servers in a domain. Individual configuration settings take precedence over group settings, which take precedence over domain settings. You modify settings in Configuration documents with the administration panel. You do not need to restart the servers for the new settings to take effect.
Domain documents Domino creates Domain documents to set up and configure Domino domains. You can create Global domains, which group Domino domains into a single Internet domain; Adjacent domains, which are connected to each other; Non-adjacent domains, which act as intermediaries between two unconnected domains; and Foreign domains, which use different mail systems from Notes mail. For more information on Global Domain documents, see Chapter 11. Network documents Domino creates a Network document for each Domino named network you set up. Network documents list the network name, servers in the network, network title, and network administrator. Program documents You create Program documents to schedule and run server programs. Program documents give you greater control over when a program runs than you have by modifying the server NOTES.INI file. Run OS/2 command files, Domino server programs, API programs, UNIX shell scripts, or UNIX programs with Program documents. Setup Profile documents You create Setup Profile documents to configure Notes workstation settings for users. Use profiles to set up batches of users who have the same default settings. To ensure system security and efficiency, limit access to the Public Address Book through the database ACL by using access levels, permissions, and roles. With roles, you can decentralize and delegate administration securely.
Address Book when the Rename Server in Address Book request appears in the Administration Request database. Shut down the Update, Router, and Replicate server tasks. Enter a Tell Adminp Process New command from the server console. When the status of the Administration Process is idle, load the Updater task to update the view indexes of the Public Address Book. When the Updater is idle, restart the Router and Replicator tasks. Use the Push server command with the name of the server whose name is changing to force replication of the modified Public Address Book to the upgraded server. For more information on setting up the Administration Process and on server tasks, see chapter 7 in Getting Started with Domino. For more information on creating groups in the Public Address Book, see Chapter 3 in Getting Started with Domino.
Information on how users connect to the Internet, including Domino server name or Web server address, browser type, proxy configuration, and Internet e-mail address. Training on how to use the client software, any messaging product such as Lotus Mail, and Notes databases. For more information, see Chapter 2.
Automated installation
With automated installation, you can have options automatically selected during the Notes workstation installation and setup. Edit the installation response file (.RSP extension) provided with the Notes software. You can create multiple response files for different customized installations. Users select the appropriate response file during installation and no further user interaction is needed for installation and setup. In addition, you can use response files with software distribution programs to install the Notes workstation, appropriately configured, automatically. Installation and setup using response files are available for Windows and OS/2 workstations. To aid users in adding the correct databases to their desktop, create portfolios or database libraries containing the desired databases. You can put portfolios and libraries on a server and instruct users to access them after workstation setup.
About communication
Domino servers and Notes clients are connected over a network. Server-to-server and client-to-server connections can take one or a combination of these forms: Always connected through a local area network (LAN) or a wide area network (WAN) Sometimes connected through a communications port used for dial-up connections Sometimes connected via remote LAN service Connected through both LAN/WAN and a dial-up port For information on network configurations, see Configuring the Domino Network.
87
A Domino named network is a subgroup of Domino servers that are physically connected. Domino treats a Domino named network as physically separate and distinct, even if it is connected to other servers and other Domino named networks. Mail routes automatically in a Domino named network and does not require Connection documents for delivery. A servers Domino named network is listed in its Server record in the Public Address Book. A Connection document specifies how and when two servers connect, usually to exchange mail and to update common databases through replication. You need a Connection document from each server to the other to route mail. A routing table is a list of connections from a Domino server to all other servers it can contact. Domino assembles this table when the server starts by searching the Server, Connection, and Domain documents in the Public Address Book. Domino uses the routing table to determine the best, least-cost path to deliver mail. A router is the Domino server task that moves mail messages between the senders mail file and the recipients mail file. A MAIL.BOX file is the Domino mailbox; all outgoing and incoming mail on a server is held in MAIL.BOX until it is delivered. Mail is transferred from the senders mail file to MAIL.BOX before being routed. Routing moves the message from MAIL.BOX on the senders server to MAIL.BOX on the recipients server. Domino then moves the message from MAIL.BOX to the recipients mail file. A home server for a given user is the server on which that users mail file is located. A Message Transfer Agent (MTA) routes and converts messages from different formats, such as MIME and Notes mail. Mail routing occurs on the backbone of your mail infrastructure, including your domain and Domino named network setup. When planning mail routing, consider the following tips: Designate one server in each domain to connect to other domains. Designate one server in each Domino named network to connect to other Domino named networks. Use shared mail to reduce network traffic and the space needed to store mail. Use the mail trace feature in Domino to see the fastest route for mail and to debug routing problems. Schedule mail routing and replication together as tasks in Connection documents. This minimizes the number of Connection documents you need to create and reduces network traffic.
Chapter 10: Deploying Mail 89
The Outbound Session Controller reads the message from the Outbound Work Queue and notifies (or creates) an Outbound Session Handler task passing the message ID. The Outbound Session Controller can launch up to three handlers by default; however, you can configure it to launch a maximum of eight handlers. If possible, the controller groups message for the same host to reduce overhead. The Outbound Session Handler retrieves the message from the work queue. It resolves the specified Destination Host to an IP address, opens a connection to the destination, and sends the message through the SMTP protocol driver. It then changes the state of the message in the Outbound Work Queue to Sent. The Delivery Report Task removes the message from the Outbound Work Queue and SMTP.BOX. If the message experiences a temporary failure for example, if the destination was unavailable the message will be requeued to be resent later. If the message experiences a permanent failure for example, if the destination host is unknown or the user on that host is unknown the Delivery Report Task generates and sends a Non-delivery Report to the sender and removes the original message from the Work Queue and SMTP.BOX.
Add-in Controller
The Add-in Controller (task name: SMTPMTA) is the task that is loaded on the Domino server. It acts as a control point for all the other tasks. All commands for the MTA are sent to the Add-in Controller and it notifies the necessary child processes for example, Tell SMTPMTA Quit.
4. Decide the format your organization uses for inbound address, for example: @acme.com @sales.acme.com @mail.acme.com 5. Make sure that the inbound Internet mail addresses for the MTA server are defined in the Domain Name System (DNS). 6. If your company site uses a mail relay system or a firewall for security reasons, find out the full name or IP address for that system (for example, 130.000.00.00). Ensure you have connectivity to that system.
If successful, the Ping utility returns a message in a format similar to the following:
64 bytes from 130.000.00.00: 1cmp_seq=4, time=0, ms
So that all mail from the Internet can get to the MTA on Lobster/SEAFOOD, SEAFOOD is a member of the global domain, ACMEGlobal. All Internet mail to and from the SMTP/MIME MTA global domain is addressed @acme.com. All messages that have an address containing a period after the @ sign are seen as an Internet address by Domino and are routed to the MTA. Public Address Book Requirements For this scenario, you can generally use the default field values in each document.
One Global Domain document. You may need to create a new document. You must complete or add information in the following fields: Domain type, Global Domain name, Global domain tasks, and the Internet domain suffix(es). The X.400 address conversion fields are not applicable unless you are also configuring an X.400 MTA on the same server.
One Foreign Domain document. You may need to create a new document. You must complete the following fields: Domain type and the Domain name (under Should be Routed to). In this configuration, messages addressed to Internet Domain are wildcarded (*.*). This means that any mail message having an Internet address should be routed to the domain name chosen for the configuration; for example TheInternet.
One Server Connection document. You may need to create a new document. You must complete the following fields: Connection Type, Source server, Destination server, Destination domain. The Destination domain is defined as the target for the Foreign SMTP domain. The name in this field is arbitrary and should not be the same name chosen for the Source server.
One Server document. You must edit the server document for the server containing the MTA. You must complete the following fields: Routing tasks, Global domain name, and Fully qualified Internet host name.
Example: Accessing the Internet through a firewall or other mail relay system
Acme Company has a working SMTP connection and is registered with the Internet service provider as acme.com. They have one Domino domain called SEAFOOD. SEAFOOD contains several Domino servers (Lobster, Crayfish, and Shrimp), but only Lobster/SEAFOOD contains an SMTP/MIME MTA. Therefore, any mail originating in Crayfish or Shrimp that is using SMTP to send messages to the Internet must route through the MTA on Lobster.
This configuration differs from Example 1 (Connecting one SMTP/MIME MTA directly to the Internet) in that mail needs to route to another system (for example, 130.000.00.00) rather than connect directly to the Internet. This other system does not need to be part of the Domino network, but it does need to have a direct connection to the MTA server. Public Address Book requirements For this scenario, you can generally use the default field values in each document, except where specified.
One Global Domain document. You may need to create a new document. You must enter information in the following fields: Domain type, Global Domain name, Global domain tasks, and the Internet domain suffix(es). One Foreign Domain document. You may need to create a new document. You must enter information in the following fields: Domain type and the Domain name (under Should be Routed to). One Server Connection document. You may need to create a new document. You must enter information in the following fields: Connection Type, Source server, Destination server, Destination domain. To indicate the firewall or relay to be used, you must also indicate the Optional network address name or the IP address of that system.
One Server document. You must edit the server document for server containing the MTA. You must enter information in the following fields: Routing tasks, Global domain name, and Fully qualified Internet host name.
About accessing the Internet through a firewall with Intranet messages delivered directly
What if your organization needs to access an internal network (an intranet), as well the Internet? You still want to set up a firewall or use a mail relay system to forward the mail between the MTA and the Internet because that keeps your systems secure. However, you may want to access your Intranet directly without going through a firewall. You still must register your organization with an Internet service provider, and their DNS must be set up to have a mail exchange (MX) record for their Internet address to the Relay/Firewall (if required for inbound mail) and an
Address (A) record to the server where the MTA resides. They must then configure the Public Address Book to contain the minimum documents required to install an SMTP/MIME MTA. Example: Accessing the Internet through a firewall with Intranet messages delivered directly Acme Company has a working SMTP connection and is registered with the Internet service provider as acme.com. They have one Domino domain called SEAFOOD. SEAFOOD contains several Domino servers (Lobster, Crayfish, and Shrimp), but only Lobster/SEAFOOD contains an SMTP/MIME MTA. Therefore, any mail originating in Crayfish or Shrimp that is using SMTP to send messages to the Internet must route through the MTA on Lobster.
Additionally, Acme has an Intranet, where Notes messages can be transferred without going through the firewall. Because these messages have an SMTP address, they are also processed through the SMTP/MIME MTA on Lobster. Public Address Book requirements For this scenario, you can generally use the default field values in each document, except where specified.
One Global Domain document. You may need to create a new document. You must enter information in the following fields: Domain type, Global Domain name, Global domain tasks, and the Internet domain suffix(es). Two Foreign SMTP Domain documents. One Foreign SMTP Domain document routing to the Internet. All SMTP mail that is addressed to the Internet domain *.* automatically routes to the virtual domain name, TheInternet. One Foreign SMTP Domain document routing to the Intranet. All SMTP mail that is addressed to the domain *.acme.com automatically routes to the virtual domain name, TheIntranet. The MTA recognizes that acme.com is internal and therefore routes the mail to the Intranet rather than sending it outside to the Internet.
Two Server Connection documents. One Server Connection document for the Internet. You may need to create a new document. You must enter information in the Connection Type and Source server fields. The Destination domain must match the domain entered in the foreign domain document (TheInternet). This field should not be the same name chosen for the Source server. You can give a virtual name for the Destination server (All Internet Hosts). To indicate the firewall or relay to be used, you must also indicate the Optional network address name or the IP address of that system. One Server Connection document for the Intranet. You must create a new document. You must enter information in the Connection Type and Source server fields. The Destination domain must match the domain entered in the foreign domain document (TheIntranet). This field should not be the same name chosen for the Source server. You can give a virtual name for the Destination server (Local SMTP Hosts).
One Server document. You must edit the server document for the server containing the MTA. You must enter information in the following fields: Routing tasks, Global domain name, and Fully qualified Internet host name.
About using one MTA for Internet messages and one MTA for Intranet messages
This scenario is similar to accessing the Internet through a firewall with Intranet messages delivered directly, except that two MTAs are used to handle the messaging load. In this example, Internet message traffic should not impact the throughput of messages to other local systems. For this configuration to work correctly, there are two ways you can set up the DNS. You can register your organization with an Internet service provider, and their DNS must be set up to have a mail exchange (MX) record for the Internet address to the Relay/Firewall (if required for inbound mail) and an Address (A) record to the each server where an SMTP/MIME MTA resides. You must then configure the Public Address Book on each MTA server, to contain the minimum documents required to install an SMTP/MIME MTA. For more information, see Using one MTA for Internet messages and one MTA for Intranet messages. Example: Using one MTA for Internet messages and one MTA for Intranet messages Acme Company has a working SMTP connection and is registered with the Internet service provider as acme.com. It has one Domino domain called SEAFOOD. SEAFOOD contains several Domino servers (Lobster, Crayfish, and Shrimp). Lobster/SEAFOOD and Shrimp/SEAFOOD each contain an SMTP/MIME MTA.
Chapter 10: Deploying Mail 105
Lobster/SEAFOOD is configured to send and receive mail to the Internet. This scenario could be configured for either a direct connection or to pass through a firewall. Shrimp/SEAFOOD is configured to send and receive SMTP mail from the Intranet. Any messages received from the Internet destined for any of the servers, must go through Lobster/SEAFOOD. Any messages received from the Intranet destined for any of the servers, must go through Shrimp/SEAFOOD. Public Address Book requirements For this scenario, you can generally use the field values in each document, except where specified. One Global Domain document. You may need to create a new document. You must enter information in the following fields: Domain type, Global Domain name, Global domain tasks, and the Internet domain suffix(es). Two Foreign SMTP Domain documents. One Foreign SMTP Domain document routing to the Internet. All SMTP mail that is addressed to the Internet domain *.* automatically routes to the virtual domain name, TheInternet.
One Foreign SMTP Domain document routing to the Intranet. All SMTP mail that is addressed to the domain *.acme.com automatically routes to the virtual domain name, TheIntranet. The MTA recognizes that acme.com is internal and therefore routes the mail to the Intranet rather than sending it outside to the Internet.
Two Server Connection documents. One Server Connection document for the Internet: You may need to create a new document. You must enter information in the Connection Type. The Source server fields must reflect the name of the server on which the MTA resides (Lobster/Seafood). The Destination domain must match the domain entered in the foreign domain document (TheInternet). This field should not be the same name chosen for the Source server. You can give a virtual name for the Destination server (All Internet Hosts). To indicate the firewall or relay to be used, you must also indicate the Optional network address name or the IP address of that system.
One Server Connection document for the Intranet. You need to create a new document. You must enter information in the Connection Type. The Source server fields must reflect the name of the server on which the MTA resides (Shrimp/Seafood). The Destination domain must match the domain entered in the foreign domain document (TheIntranet). This field should not be the same name chosen for the Source server. You can give a virtual name for the Destination server (Local SMTP Hosts).
Two Server documents. One Server document for the SMTP/MIME MTA connected directly to the Internet. You must edit the server document for server Lobster/SEAFOOD. You must enter information in the Routing tasks, and the Global domain name. The Fully qualified Internet host name represents your full Internet address for this server.
108 Planning the Domino System
One Server document for the SMTP/MIME MTA connected to the Intranet. You must edit the server document for the server Shrimp/SEAFOOD. You must enter information in the Routing tasks, and the Global domain name. The Fully qualified Internet host name represents your full Intranet address for this server.
Second, Domino must decide how to move the message from the senders server to the recipients server by finding a connection between domains. Servers in the two domains are connected by Connection documents, allowing mail routing and replication between the domains. Domino moves the message from the senders server to the connected server in that domain, then to the connected server in the second domain, then to the recipients server. There is no direct connection between the two domains, but other domains server as intermediaries. Domino looks in the Public Address Book of the senders domain for a Non-adjacent Domain document, which gives a path specifying the domains through which a message must pass to reach the destination domain. Domino then checks for a connection between a server in the senders domain and the first domain in the Non-adjacent Domain document. Domino moves the message from the senders server to the server connected to the intermediate domain. When this connected server contacts the server in the intermediate domain, it transfers the message. Domino repeats this transfer process between domains until the message reaches the target domain, where it is moved to the recipients server.
Directory assistance
Directory assistance allows users to select names from secondary Public Address books.
Users can use addressing feature to select names from secondary Public Address books Users can use the type-ahead mail addressing to search names from secondary Public Address books Name of a recipient from a secondary Public Address Book resolved before memos sent Low disk space usage Failover to another replica of a secondary Public Address Book Permanently open server sessions Public Address books replicated primarily or exclusively within their domains only Uses rules for more efficient searching of secondary Public Address books
No
Yes
No
No
Yes
No
No
Yes
No
No
No No Yes No
Not Available
Yes
No
No
Firewalls
Consider carefully how you connect to the Internet. Many organizations install firewall software that protects their intranet from unauthorized external access. A firewall works at a hardware or software level to control access to your system. Firewalls implement such security measures as packet filtering, application-level gateways, circuit gateways, and are often used in conjunction with a proxy server. The Domino server and Notes workstation do not rely on a firewall. The Domino registered TCP socket (1352) can be
120 Planning the Domino System
left open in your firewall if you take appropriate security measures at the server and database level. Firewalls are useful to protect other parts of your system such as FTP and Internet mail.
Proxy servers
You can use a proxy server for your organization to mediate between client requests in your company, such as HTTP requests from a browser, and servers outside your firewall. Proxies mask the return address of the requesting computer, providing secure anonymity for users and denying any potential targets. Proxies can implement protocol-specific security and allow you to filter incoming requests to the various protocols on your system. For example, you block all HTTP requests to objectionable Web sites using a proxy, or prevent users from downloading files via FTP except from specified trusted hosts. Some proxies run virus detection programs on incoming packets. Proxies improve performance by caching information. If a user requests www.lotus.com through a proxy, the proxy will cache the HTTP information from www.lotus.com. Other users who request this site are sent the cached page information from the proxy, eliminating the need to transfer the data from www.lotus.com again. This conserves bandwidth and results in faster rendering of sites for your users. You can use a proxy to mediate requests from outside your firewall. For example, you make some internal documents available to public request by caching them on a proxy server outside your firewall.
Encryption
You should create a corporate policy instructing users to be cautious in transmitting any personal or company information over the Internet. Unless encrypted, this data is easily intercepted. This protection is particularly important for data such as user names, passwords, confidential product information, and electronic commerce information like credit card numbers. While browsers allow you to verify attaching to a secure server, there is no way to be certain of the identity of this server without using other means: a user might connect to an unsecure server, believing that it was in fact another, secure computer. Domino supports version 3.0 of the Secure Sockets Layer (SSL) protocol, which allows secure encrypted communications in HTTP transactions. SSL is a public/private key RSA cryptographic system that uses key ring files to store the encryption codes needed for private communications. If you connect to a Domino server using SSL, information exchange is highly secure. Domino Directory Services, POP3 server, Web Navigator, and News Discussion server all use SSL for enhanced security. Domino can act as a Certifying Authority (CA) for SSL certificates.
Chapter 11: Ensuring Security in a Domino System 121
Notes client
With the Notes client, Domino uses an RSA public-private key algorithm that is even more secure than SSL and that virtually eliminates the possibility of data interception or packet sniffing. The Domino - Notes combination is the most secure client - server package available and has a security model that has been proven through time and use. You can use Notes features such as Read access lists, Edit access lists, Authors fields, and Readers fields in your Internet databases to control access to documents. Note Field-level encryption does not work on the Web. Be cautious in exposing databases with field-level encryption to browser client access as these clients may be able to read the encrypted fields. For information on extranet security, see Chapter 7.
users to use long alphanumeric passwords to defeat dictionary attacks, where a program attempts to crack passwords by running combinations of letters against the password challenge, and remind them not to write down passwords. The major concern for network security is intentional, malicious access by unauthorized users. Following the security precautions in these sections aids in protecting your network against these attacks. Monitor server log files for suspicious queries or attempts to access your system. Limit root access to servers and protect system files carefully. Remove unneeded services and protocols from your firewall to deny potential access points. Both firewalls and proxies can log activity, which helps you detect suspicious actions. Use a tool such as SATAN (System Administrator Tool for Analyzing Networks) to check your network for security flaws. Remote access is often a source of risk. Ensure that modems and remote servers have the same access protections as the other access points in your organization. Utilize dial-back and password protections for modems. Domino can encrypt data that travels through its system and over your network. This option encrypts data packets at the port level. If you are using the Internet to transfer data, encrypt the data by choosing File - Tools - User Preferences, clicking the Ports tab, and selecting Encrypt Network Data.
The Notes client has a security feature called the Execution Control List (ECL) that guards against the unauthorized execution of programs received via e-mail or in a database. The ECL allows you to restrict the access and execution rights of programs depending on the digital signature of the documents author. You can allow programs created or sent by a colleague to run without restrictions but deny programs received via the Internet. If you receive a file from an unknown sender, you can choose not to run the file, to run it once but not to trust the sender, or to trust the sender and run programs sent by the same person in the future.
Verifying identities
Certification allows Domino to verify the identities of users and servers. An ID file is like a passport; certification is the border control process that stamps passports. If a user or server possesses a passport with the correct stamp, they can enter the destination. Cross-certificates are like visas; they
124 Planning the Domino System
allow controlled access to areas outside your organization, or permit you to give people outside your organization controlled access to certain parts of it. With cross-certificates, Notes users from different organizations can authenticate with your servers. Each organization cross-certifies one ID file from the other and stores the cross-certificate in its Public Address Book. Cross-certification can occur at all levels of certification and can limit access to a given OU level. Cross-certification does not have to be at the same level in both directions. To restrict access by other organizations to certain servers, use Server access lists. Both certificates and cross-certificates can have expiration dates, limiting the risk of a lost or compromised ID file. This forces users and servers to have their ID files restamped at set intervals or by a certain date. Certification affects server and user registration, server access, and electronic signatures. It verifies users and servers securely in both directions. Users and servers are referred to in Domino and Notes by their hierarchical names, or their user/server name plus their certificates. Judy Smith, who works for Acme and whose certificates are /ACME and/SALES /ACME, would be recognized as Judy Smith/SALES/ACME. Always use hierarchical names in access control lists and Server access lists to prevent people with the same given name but different hierarchical names from accessing each others files.
/ACCOUNTING/WEST/ACME, and a third business unit for the individual office in which a server or user is located, such as /PHOENIX/ACCOUNTING/WEST/ACME. With these certifiers, Acme can limit access to the Sales servers to employees with the /SALES certificate on their IDs. Lotus recommends reserving one OU to distinguish servers; for example, /H/ACME could identify a hub server and /M/ACME a mail server. Guard certifiers vigilantly if compromised, they could allow unwanted access to your system. You can set multiple passwords on certifier ID files and require that a certain number of those passwords be entered before the ID can be used. For example, if you had four administrators with access to the certifier ID, you could set four passwords on the ID, give one to each administrator, and require a minimum of two passwords to use the ID. This prevents a single person from misusing the certifier. You can create organizational unit certifiers to decentralize administration, improve security in case a certifier is compromised, to provide context for servers and users, and to distinguish people with the same name. By creating multiple certifiers, you allow more than one person to create and certify new users. You can use wildcards in access control lists (ACLs), such as */ACME, which would allow anyone with the /ACME certificate to access a database. Should an OU certifier file be lost or compromised, there is less work to recertify users than if an O certifier is lost, since you only recertify the employees and servers stamped with that certifier. If a certifier is lost, recertify all servers and users stamped with that certifier and then deny access for IDs with that certificate to all servers. Certificates help provide context to the function of a server or user; the certified name of the server Data1/Finance/Boston/Acme indicates what the servers role is. Multiple certifiers reduce the risk of having multiple people with the same name and the same certificates. For example, Domino regards Jane Doe in Marketing and Jane Doe in Administration as separate people, even though they have the same name, because they have different certificates: Jane Doe/MARKETING and Jane Doe/ADMIN. In addition, certificates conform to the X.500 naming convention. Domino maintains a certification log with a document for each user and server with their name, license type, ID number, and date of certification and expiration. You create additional certifiers in the Public Address Book. Caution Do not use the failure to certify an ID as an access control mechanism. Use database ACLs to control data access. Certifying IDs enables authentication, which allows checks on access control.
The association between public and private keys created by certificates avoids the problem of public key spoofing, where a user attempts to convince another user or server that a valid public key belonging to someone else belongs to that user. Certificates can be compared to notarized messages stating that a public key is associated with a particular name. If an entity has a certificate signed by a certifier and can determine the certifiers public key, it can verify the signature on the certificate. Notes public keys are used both for authentication and for mail encryption. You can create new public keys for users but must recertify the ID files for those users. Domino can keep clients from using the old public key and can be set to authenticate only clients whose public keys match the public keys in the Public Address Book. Notes client ID files contain a private key that is mathematically related to the public key stored in the Public Address Book. Information encrypted with one key can be decrypted with the other. Lotus strongly recommends that you protect all ID files with passwords. Encourage users to use long alphanumeric passwords. Passwords should be at least 13 characters in length. Using mixed uppercase and lowercase letters and numbers improves password security. Using a phrase for a password makes the password easier to remember and reduces the chance that an attacker could guess it. It is important for users to remember their passwords and to keep backup copies of their ID files; if they forget the password or lose their ID file permanently, they can no longer access data encrypted with that password. To defeat dictionary or brute force attacks on ID file passwords and to reduce the risk of password capture, Notes employs an anti-spoofing password dialog box. If users enter an incorrect password, Notes waits for several seconds before allowing them to try again. This delay increases with each incorrect attempt to a maximum of thirty seconds. The delay feature makes it difficult to try rapidly many passwords in succession in the hope of guessing the right combination. Also, the dialog box has a series of hieroglyphic symbols on the left side that change as users enter their password. These dynamic symbols make it more difficult to substitute a false dialog box that captures passwords in place of the Notes dialog box. Tell users to be alert to the symbols as they enter their passwords if they notice that the symbols do not change or are not present, they should stop entering their password and click Cancel. ID files allow Notes clients to create verifiable digital signatures on documents. These signatures assure readers of the identity of the document author and confirm that the document has not been tampered with since it was created. For example, digital signatures allow you to be sure that a mail message is really from a colleague and not from an untrusted third party.
Access levels
Access levels control the type of actions an entity can perform on the contents of a database and on the database itself. Each access level has the permissions of those below it; for example, authors can perform all of the functions of a Depositor and a Reader. No Access denies access to an entity. Depositor does not allow an entity to view the contents of the database but allows them to create certain documents in it. Readers can read documents in the database that do not have Readers fields and Authors can create documents that do not have specific access restrictions. Editors can change the content of saved documents. Designers can modify the design of all database elements and Managers can change the ACL itself. Entities may have different levels of access in an ACL if they appear in multiple groups or as individual entries and as members of a group. The access granted in an individual entry takes precedence over that granted through a group entry. If in multiple groups, the group with the highest level of access controls. If an entity has one level of access in the ACL and another level in a Read list or View access list, the element (document, view, etc.) list can lower that entitys access.
Permissions
You can control what actions entities can take in a database with ACL Permissions. Permissions include the ability to create documents, delete documents, create personal agents, create personal folders/views, create shared folders/views, create LotusScript agents, read public documents, and write public documents. Public documents are documents designed
130 Planning the Domino System
to be accessed by a wide audience, such as the busy and free times in your personal calendar. Users with the Write public documents permission can read, create, edit, and delete public documents from a database.
Roles
The ACL structure described above applies to all databases. However, you may want to create permissions that apply only to one database. Use roles to accomplish this. Roles grant access to individual elements in a database, such as forms or views. For example, your company has a phone number database with two forms: a Phone Number form and a Request Change form. You want all employees to create a Request form, but only the office manager to create a Phone Number form. You create a Role called Phone and change the security on the Phone Number form so that only users with the Phone role can create documents with that form. You can leave employees with Author access, knowing that only the office manager can create the Phone Number form. You can ensure that all replicas of a database have the same ACL by selecting the Enforce consistent ACL across all replicas option on the Advanced panel of the ACL. This prevents users from creating a replica and modifying its ACL to gain access to confidential information.
Internet
Use the Maximum Internet name & password access field to choose the maximum level of access users have when accessing a database from a Web browser. This access overrides individual levels set in the ACL. Domino logs all ACL changes for auditing.
135
Configuring, monitoring, and troubleshooting replication and mail routing. Administrators set up and maintain shared mail, schedule and configure replication, set mail thresholds, reroute dead mail, configure POP3 clients and files, and set replication access levels among servers. Setting up and monitoring scheduling, free time lookups, and the resource reservations database to enable calendaring and scheduling at an organizational level. Setting up, monitoring, testing, and ensuring server and network security. Dealing with remote connections to servers, including access issues, passthru, and hunt groups. If your company uses Domino Advanced Services, setting up clustering, billing and monitoring, failover, load balancing, and partitioned servers. Managing users. Administrators add, remove, and certify users, as well as manage moves from one home server to another or from one domain to another. Responding to user requests, problems, and suggestions. Monitoring the Log and statistics databases. Monitoring Internet access and ensuring a stable, reliable connection to the Internet. Backing up databases and files. You can administer Domino servers from a Lotus Notes Designer for Domino client, a Web browser via the Web Server Administration Tool, and from an administration-only Notes client which is included with each Domino server license. With the Web Server Administration tool, you administer a Domino server from a browser through a URL that accesses an administration database. Domino provides access control to the database with challenge-response password authentication and optional SSL encryption and authentication. The administration-only Notes client lets you use the server administration panel, the Administration menu, and your mail file.
Monitor performance of the server (especially on Windows NT) Optimize views and full text indexing Select a type for Groups. You can designate a Group as Access Control List only, Mail only, Deny list only, or Multipurpose. Designating Group types reduces view size since Groups appear only in the appropriate views, improving the speed of view display.
Avoid using a file server concurrently as a Domino server. Performance of either the file server or the Domino server suffers if one uses a lot of processing time. Additionally, if a program on the file server must be restarted, you must restart all other programs or processes, including Domino. Restart the server on a regular schedule. Many databases that are always open on a server, such as the Server Log, the Public Address Book, and the Statistics Reporting database, build up deletion stubs that do not get purged until the server is restarted. If you wait too long between restarts, the purge process will slow down server startup. Configure the server to run as many sessions as possible. The Domino server establishes a session for each task, such as replication and mail routing, and for each user who accesses the server. Domino allows users to access the server even after the maximum number of configured sessions is reached. When a new user tries to access the server, Domino drops the session for the user who has accessed the server least recently. Dropped users arent affected since when they access the server again, they experience only a slight delay as a new session is established. However, if the server is consistently pushed to the limits of its sessions, users may complain about slow performance. To avoid this, be sure that the server is configured to allow as many sessions as possible. If the server is still overloaded, consider adding another server or reducing the number of users who access the overloaded server. For more information on monitoring server performance, see Chapter 3 in Maintaining the Domino System.
Monitor server statistics and events to track disk space, server load, memory, swap space, and to head off server trouble. Monitor database replication and ACL changes using event monitors. Periodically run the Compact utility to keep wasted database free space to a minimum. For more information on monitoring and maintaining servers, see Chapters 3 and 4 in Maintaining the Domino System. For information on using the Administration Process to make global changes to access control lists, see Chapter 2 in Getting Started with Domino.
Guidelines for monitoring statistics and events Choose a standard set of statistics that you want all server administrators to monitor. Establish alarm thresholds for various server configurations. Centralize statistic and event monitoring to reduce administrative overhead. Not every server needs its own Report task and Statistics Reporting database. Instead, run the Collector on a central server and store statistics from various servers in one central database where one administrator can monitor the information. Decide how to handle alarms generated by statistic monitoring. For example, you might specify that alarms trigger trouble-tickets that are sent either to a mail-in database or directly to an administrator. Use Event Monitors and Message to Event Mapping documents in the Statistics & Events database to automatically monitor messages that get logged to the log file. Use access control list (ACL) and Replication Monitors to monitor the ACL and replication schedules of key databases. Use the Statistic Analysis reports to look for trends, slow-downs, and peak usage periods over a period of time. For more information on monitoring statistics and events, see Chapter 3 in Maintaining the Domino System.
Memory_Quota
MinNewMailPoll
NSF_Buffer_Pool_Size
143
Description Enables (=0) or disables (=1) database caching. The database cache stores data required to open recently opened databases. A database stored in the cache can be opened more quickly than one not stored in the cache. Sets the maximum number of databases stored in the database cache (if enabled). For short intervals Domino will store up to 1.5 times the number entered for this variable. Increasing the maximum number of databases improves performance but requires more memory. Controls the tasks that the server runs. These tasks start automatically at server startup and continue until the server is shut down. Improve performance by removing tasks that aren't appropriate to the server if it is a specialized server. Do not remove the update task from a server. If you do so, the Public Address Book will not update.
NSF_DbCache _Maxentries
ServerTasks
For more information on editing system variables in the NOTES.INI file, see Appendix A in Getting Started with Domino.
Improving STARTUP.NCF
For good performance on the NLM server, include this line in STARTUP.NCF to ensure that the file server keeps enough network data packets in memory to respond promptly to requests for transferring data across the network:
set minimum packet receive buffers=X
where X is a number between 10 and 1000, with 10 being the default. Use the NetWare Monitor to check the server's current setting.
144 Planning the Domino System
Improving AUTOEXEC.NCF
In the AUTOEXEC.NCF file or at the NetWare console, load the Domino server for NetWare before loading the NetWare Monitor. Due to a known problem in the NetWare Monitor program, processor use can approach 100% if you load the Monitor program before loading the Domino server. Modify the AUTOEXEC.NCF file as follows:
load notessrv load monitor NLM setting in AUTOEXEC.NCF set maximum packet receive buffers=1000 Description To avoid using all available memory on the server, limit the number of network data packets that can be stored in memory. Specify 1000 when a high number of network transactions is expected. Default is 100. Use the NetWare MONITOR to check the server's current setting. The dirty disk cache is information in memory that is written to disk shortly. The delay time specifies how long the operating system waits before writing the information to disk. Specify 7.5 seconds to make disk operations more efficient. The range for this variable is between 0.1 seconds and 10 seconds, with 3.3 seconds being the default. File caching improves file access time by taking the most recently read data from the disk and keeping it in file cache buffers in memory until it's needed. Establishing a minimum number of file cache buffers ensures that a certain amount of memory is dedicated to file caching. Specify 1000 to ensure that Notes users can access files quickly. The range for this variable is between 20 and 1000, with 20 being the default. continued
Description If you are running NetWare 3.12, you don't need to change this variable. The default of 8MB should be adequate. The Alloc Short Term Memory pool is a block of memory set aside for the temporary use of the operating system and loadable modules. Specify 5MB to ensure that the NLM server has enough short-term memory to use for its normal operations. Determines whether you can recover accidentally deleted files using the NetWare FILER's "Salvage deleted file" option. The default is OFF, which allows recovery of deleted files. Set to ON increases the amount of disk space available, but can cause users inconvenience. When set to ON, the server must respond to "Get Nearest Server" requests from workstations. Set the default setting (OFF) to conserve server processing time. When information is written to disk, this setting determines whether the information is compared against the same information held in memory. The default setting is ON, which ensures the integrity of the data. Setting to OFF speeds up disk operations, but increases the risk of corrupted files.
HPFS systems are usually three times faster than FAT systems and allow for better storage of small files, although the drive is not shareable with DOS and requires a long boot time after a crash. FAT systems allow you to share a drive with DOS so systems can be dual-boot, but they are slower and provide poorer storage for small files.
Disk swapping
OS/2 Warp makes extensive use of disk swap space. Be sure that the drive where OS2\SYSTEM\SWAPPER.DAT resides has at least 5MB to 10MB free for normal expansion by OS/2 Warp. OS/2 Warp uses this file as virtual memory. To enable disk swapping, Domino requires the following statement in the CONFIG.SYS file:
MEMMAN=SWAP,MOVE
When the swap file becomes too big, which is usually due to low memory conditions, server performance deteriorates and the server may crash. Restart the server to clear the swap file and then automatically reset the file to the default value of 512KB. If the swap file consistently exceeds 20 percent or more of RAM, increase system memory to the maximum size allowed by OS/2 Warp. For example, with 6MB RAM and a swap file of 1.5MB, the swap file is 25 percent of RAM. To improve performance, add 2MB of RAM.
Disk caching
Disk caching keeps the most recently read data in RAM until it's needed again. By setting up a disk cache, you can dramatically improve the time it takes for Domino to read data from the disk. HPFS Set the HPFS cache to 10 to 15 percent of the total available RAM, up to a maximum disk cache of 2048K. To set the DISKCACHE to 1536 blocks (1 block=1K), enter the following IFS and RUN statements in the CONFIG.SYS file:
IFS=C:\LANMAN\NETPROG\HPFS386.IFS /I:C:\LANMAN /AUTOCHECK:DE RUN=C:\LANMAN \NETPROG\CACHE386.EXE /LAZY:ON /MAXAGE:5000 /BUFFERIDLE:500
FAT Set DISKCACHE between 512 to 1024 blocks. To set DISKCACHE to 1024 blocks (1 block=1K), enter the following statement in the CONFIG.SYS file:
DISKCACHE=1024 blocks
Configuring memory
Good server performance depends on adequate memory. Configure a new server with the maximum amount of memory you can afford. If you have a performance problem with an existing server, increasing memory should help. Note OS/2 2.x can handle more than 16MB of RAM. To force Domino to take advantage of more than 6MB, set the NOTES.INI variable NSF_Buffer_Pool_Size.
This entry specifies that the Windows NT system should work as a file server rather than an application server because Windows NT will favor the system-cache working set rather than the processes working set. On a Windows NT workstation, the setting for that Registry entry is zero. If you are running a Domino server on a Windows NT system set as a file server, the excessive page faults and paging activities can result from memory-intensive processes. For example, rebuilding the index for a large
148 Planning the Domino System
database might result in an undesirable level of paging, causing users to experience poor response times. To correct the problem, reset the Registry entry to zero and reboot the system. For more information on monitoring server performance, see Chapter 3 in Maintaining the Domino System.
Index
A
Access planning for, 31 Access Control Lists and database security, 130 Access levels described, 130 ACL and database security, 130 Address Book Public and LDAP planning, 46 Administration about planning for, 21 and performance guidelines, 137 tasks, 135 Administration Process described, 138 Administration server performance, 80 Advanced Services and messaging, 43 described, 62 planning, 31 APIs and applications, 33 Applications creating, 33 deploying, 33 deploying to Internet, 35 distributing on servers, 37 Internet security and, 35 intranets and, 53 programming tools and, 33 security planning, 23 using on intranets, 53 Assessing business needs, 8 employee capabilities, 9 employee needs, 9 organizational needs, 7 technical issues, 8 AUTOEXEC.NCF, using to improve performance, 145
B
Binary tree, 63 Browsers security in a Domino system, 128 Business processes reengineering, 7 refining, 7
C
Caching disk, 147 Calendar setting up, 117 Capacity intranets and, 55 planning for, 14 CERT.ID, 124 Certificates described, 124 Certification described, 124 Certifiers described, 125 Chain, 63 Clients automated installation, 85 deploying, 83 deploying Notes, 84 security planning, 23 Cluster, 63 CONFIG.SYS disk swapping, 147 Configuration scenarios SMTP/MIME MTA, 97, 100-101, 105 Configuring SMTP/MIME MTA, 95-97, 100-102, 105 Conflicts replication, 76 save, 77
Connection documents described, 88 mail routing and, 114 Connections testing, 96 Conventions naming, 24 Creating an intranet, 49 Cross-certificates described, 124 Cross-certification described, 124
D
Databases copies, 71 deploying, 33 deploying to Internet, 35 design, 36 distributing on servers, 37 encryption and, 131 Fixup program, 139 maintenance, 37 replicas, 71 security, 132 security of design elements, 132 system administration, 137 Dead mail, 139 Deployment clients, 83 multiple protocols and, 69 Notes, 84 Public Address Book, 78 replication planning and, 70 Directory assistance, 111 Disk caching on OS/2 Warp server, 147 configuring for OS/2 Warp server, 148
Index-1
Document management and Domino.Doc, 30 Documents security, 132 Domains and mail routing, 110 Domino administration responsibilities and, 137 Advanced Services, 62 authentication and, 127 business solution and, 2, 27-31 capacity planning and, 14 clients, 83 creating a Web site, 40 described, 88 designating servers by task, 66 document management and, 30 extranet security and, 58 extranets and, 57 information systems and, 12 infrastructure planning, 42 integrating other applications, 31 integrating other software and, 2 integration with Windows NT and, 69 Internet features, 39 Internet overview, 39 Internet planning, 16, 42 intranet planning, 17, 27 intranets and, 49 LDAP planning and, 46 legacy data and, 28 Lotus Components and, 31 Lotus SmartSuite and, 31 mail server, 88 Microsoft Office and, 31 multi-protocol environments and, 69 network connections, 86 network infrastructure and, 12 network planning, 42 partitioned servers, 62 passthru and, 68 planning, 17 planning database replicas, 37 planning for growth, 14 relational databases and, 28 replicating servers, 72 replication, 70-71 replication scheduling, 73
running on a file server, 68 SAP R/3 and, 28 security overview, 119 server administration tasks, 135 server performance guidelines, 137 server security, 127 server topology and replication, 62 setting up, 61, 72 TCP socket, 120 transaction processing and, 28 using, 1 Web sites, 40 Web tools, 40 Domino.Action creating a Web site with, 41 Domino.Broadcast and Domino intranet, 27 Domino named networks described, 88 mail routing and, 114 Domino newsgroups, 47 Domino NNTP server planning, 47 Domino Server.Planner capacity planning and, 14 NotesBench and, 15 scalability and, 14
F
Fields security, 132 File servers running Domino on, 68 Firewalls described, 120 Internet and, 100 Folders security, 132 Forms security, 132 Formulas performance, 36
G
Growth planning for, 13
H
Hierarchical naming, 124 Hub, 62 Hub-spoke, 63
I
IDs security and, 86, 128 storing, 86 IMAP mail access, 116 Inbound work queue, 94 Indexes performance and, 37 Indexing performance, 36 Information on Lotus Web sites, 4 Integration Domino and Windows NT, 69 Internet creating a Domino Web site, 40, 41 Domino features, 39 infrastructure planning, 42 messaging planning, 43 planning, 16 security planning, 23 SMTP/MIME MTA, 97, 100-101, 105 using Domino, 39
E
Editing NOTES.INI file, 143 Electronic commerce and Domino.Merchant, 29 Encryption database types, 131 security, 121 Enterprise data and Domino.Connect, 28 Environments and multiple protocols, 69 Examples configuring, 95-97, 100-102, 105 server topology and replication, 65 Extranets accessing mail and, 59 deploying, 57 planning access, 57, 59 planning security, 58
Index-2
Internet commerce and Domino.Merchant, 29 Internet mail IMAP, 90 POP3, 90 Internet security types, 120 Intranets applications, 53 capacity, 55 creating, 27 creating with Domino, 49 Domino.Broadcast and, 54 Domino Server.Planner and, 55 features, 51 mail and, 54 Notes and, 49 planning, 17, 49 push technology and, 54 return on investment and, 51 scalability, 55 security, 52 SMTP/MIME MTA, 101, 105 types of, 49 using, 51 Web browsers and, 49
L
LDAP planning, 43, 46 security, 46 Links to Lotus Web sites, 4 Log described, 140 replication monitoring, 78 LOG.NSF described, 140 Log analysis tool described, 140 Log files described, 140
Internet clients, 116 intranets and, 54 MAPI clients and, 116 MIME, 90 multiple format planning, 43 priority levels, 115 routing, 110, 113, 114 routing planning, 88 security, 133 security planning, 23 shared, 116 storage formats, 115 terms described, 88 MAIL.BOX and, 89 Mail routing Connection documents and, 114 different domains, 110 Domino named network and, 113, 114 Internet-to-Notes, 90 Notes-to-Internet, 90 overview, 90 planning, 89 Public Address Books and, 111 same domains, 110 Maintenance checking log file, 140 databases and, 37 running Fixup, 139 MAPI and accessing mail, 116 Memory performance and, 144, 148 Message Transfer Agents multiple mail programs and, 87 using, 43 Messaging planning, 43 MIME described, 45 MTA tables database, 94 MTAs using, 43 MTATABLES.NSF, 94
Network security planning, 23 NNTP and Domino newsgroups, 47 Notes automated installation, 85 creating users, 84 deploying, 84 ECL and, 128 security and, 128 NOTES.INI file editing, 143 NotesBench, 15
O
OS/2 Warp and disk swapping, 147 OS/2 Warp servers performance, 146 Outbound work queue, 94
P
Partitioned servers described, 62 Passthru, 68 Passwords and Notes, 128 Peer-peer, 63 Performance AUTOEXEC.NCF and, 145 configuring OS/2 Warp servers, 148 database, 36 full text search and, 37 guidelines, 137 NetWare servers, 144 optimizing server, 136 OS/2 Warp disk swapping and, 147 OS/2 Warp servers, 147 Public Address Book and, 80 replication, 75 STARTUP.NCF and, 144 UNIX servers, 149 Windows 95 servers, 148 Windows NT servers, 148 Permissions and database security, 130 Pilot project planning, 19 Ping utility using, 95, 96
M
Mail accessing from POP3 or IMAP, 116 concepts described, 88 dead, 139 deploying, 87 extranets and, 59 Internet and, 90
N
NAMES.NSF described, 78 Naming conventions, 24 NetWare servers performance and, 144
Index-3
Planning administration tasks, 22 Advanced Services, 31 capacity, 15 clients and, 17 database replicas, 37 deployment, 10, 18, 19 Domino and the Internet, 16 Domino integration, 12 Domino newsgroups, 47 Domino rollout, 10, 18, 19 extranet security, 58 failproof access, 31 growth, 13 information systems, 12 integrating Domino into activities, 19 Internet, 16 Internet infrastructure, 42 intranet, 17 LDAP access to the Public Address Book, 46 messaging, 43 moving to Domino, 10 Notes clients, 17 NotesBench and, 15 organization level, 10 organizational needs, 7 pilot project, 19 replication, 70 replication policies, 76 replication scheduling, 73 rollout support, 20 rollout team, 11 scalability, 13 security, 23 server administration, 21 workgroup rollout, 18 Planning the Domino System about using, 3 Policies replication, 76 POP3 mail access, 116 Priority levels and mail, 115 Programming tools and applications, 33 Protocols and Domino, 69 Proxy servers security, 121
Public Address Book cascading, 112 deploying, 78 described, 78 directory assistance, 111 documents, 78 LDAP planning and, 46 mail routing and, 111 managing, 111 performance and, 80
S
Save conflicts, 77 Scalability Domino Server.Planner and, 14 intranets and, 55 NotesBench and, 15 planning for, 13, 15 planning with Domino Server.Planner, 14 protocols and, 13 servers and, 13 Scheduling replication, 73 setting up, 117 Sections security, 132 Security access control for servers, 127 access control list, 130 considerations, 119 database, 130, 132 database encryption and, 131 digital signatures and, 123 encryption and, 121 extranets and, 58 firewalls, 120 Internet, 120 Internet users and, 128 intranets, 52 mail and, 133 network, 122 Notes client and, 128 Notes ECL and, 124 overview, 119 physical, 124 proxy servers, 121 remote access and, 123 servers, 127 viruses, 123 Web browser clients and, 128 Server access list described, 127 Server administration planning for, 21 Servers administrator tasks, 135 authentication and, 127 capacity planning, 14 checking for dead mail, 139 connecting for mail routing, 114 designating by task, 66
R
Replica IDs defined, 71 Replicas creating, 37 local, 76 Notes workstations and, 76 using, 76 Replicating servers, 72 Replication access, 72 conflicts, 76 control, 72 history, 72 local replicas and, 76 monitoring, 78 organization and, 71 performance and, 75 planning, 37, 70 planning scheduling, 73 policies, 76 scheduling, 73 server topology and, 62 servers and, 72 RFCs supported in SMTP MTA, 45 Ring, 63 Roles and database security, 131 Rollout clients, 83 multiple protocols and, 69 Notes, 84 Public Address Book, 78 router described, 88 Routing table described, 88
Index-4
Servers (continued) dividing administration tasks, 137 editing NOTES.INI for performance, 143 events, 140 installing, 61 monitoring, 138 naming guidelines, 25 optimizing performance, 136 passthru, 68 performance guidelines and, 137 planning for growth, 13 replicating, 72 replication and, 62 scalability, 14 scheduling replication, 73 security planning, 23 setting up, 61 statistics, 140 system administration, 137 UNIX performance and, 149 Setting up Domino servers, 61 Setup Profile creating, 85 Shared mail described, 116 Sharing information Sites, Lotus Web, 4 SMTP.BOX overview, 94 SMTP/MIME MTA components, 92 configuring, 95 databases used, 94 Internet mail access and, 116 overview, 45 tasks, 92 SMTP/MIME MTA configuration scenarios examples, 96 Internet and, 97, 100-101, 105 intranet and, 101, 105 SMTPIBWQ.NSF, 94 SMTPMTA server tasks IMSGCNV, 92 ISESCTL, 92 ISESHLRn, 92 OMSGCNV, 92 OSESCTL, 92 OSESHLRn, 92 SMTPOBWQ.NSF, 94
SSL and Internet clients, 128 standards supported in SMTP MTA, 45 STARTUP.NCF, 144 Statistics server, 140 Support and Domino, 20 Synchronization Domino and Windows NT, 69
W
Web browsers security and, 128 Web sites, 4 Windows 95 servers performance and, 148 Windows NT integration with Domino, 69 Windows NT servers performance and, 148 Workgroup and rolling out Domino, 18
T
Tasks Add-in Controller, 92 administration, 135 Delivery Report, 92 Inbound Message Conversion, 92 Inbound Session Controller, 92 Inbound Session Handler, 92 Outbound Message Conversion, 92 Outbound Session Controller, 92 Outbound Session Handler, 92 overview, 92 servers and, 66 SMTPMTA server, 92 Testing connections, 96 Topology and replication, 62
U
UNIX servers performance and, 149 URLs to Lotus Web sites, 4 Users registering, 85
V
Views performance, 36 security, 132
Index-5