h Clad Min Contents
h Clad Min Contents
The architecture representation on how Domino Server and HCL Notes client are connected in a
network Infrastructure. See figure A-1.
e. g.
Finance User1/Finance/Accounting/Honda – User name
Finance_Server1/Finance/Accounting/Honda – Server Name
a. Provides an easy-to-use, single point of access to everything you need to get your
3
work done quickly, including business applications, email, calendars, feeds, and
more.
b. Let’s you tailor your work environment with widgets that bring social communities
that are important to your job, both within the enterprise and across the Internet,
right into your peripheral view.
c. Enables you to work with people right at the point of context with social tools
weaved into the work experience, allowing you to pivot to the tool you need, such as
business cards, presence awareness, instant messaging, and more.
d. Offers advanced replication technology to enable you to work with
Email and applications even when disconnected from the network.
Figure A-3: HCL Domino Administrator Install Wizard Custom Setup Dialog
Using the HCL Notes full client installer make sure to select “HCL Domino Administrator” in
the Custom Setup dialog during setup to install Domino Administrator.
7. Server Document
The document that contains the default configuration of the Domino Server regarding
security, running tasks, network configuration and etc. . It is being created
automatically during the setup and configuration of the first domino server and also
4
during registration of additional domino servers. See sample server document in figure
A-5.
a. HCL Traveler
A push email technology that provides access to email, calendar, and contacts - from
your favourite mobile device. Keep your users connected and productive with full-
featured e-mail for Smartphones and tablets, while adhering to your important
corporate policies and safeguarding sensitive corporate data.
b. HCL Sametime
Software that delivers unified, real-time communication and collaboration services—
from enterprise instant messaging and online meetings to telephony and video
conferencing. So you can improve and accelerate how work gets done in a social
business. And reduce travel and telephony expenses.
1. User Maintenance
a. Register a User
Step 1. Under the Domino Administrator client, People & Groups Tab, expand Tools
section then People sub section select Register option. See image below.
6
Step 2. The Choose a Certifier dialog will appear. Just select the Domino server the user
will be registered and locate also the certifier ID to be use for registering the user in the
Organization.Click “OK” button to continue. See image below.
Step 3. Enter the the Notes Certifier password as indicated below then press “OK” button.
Step 4. Enter User information as show below then click “Password Options” button
7
Step 5. Under the password options dialog, you can increase the Password Quality Scale
and then don’t forget to select the “Set internet password” check box to allow Notes client
and internet password to the same. Click the “OK” button to continue. See image below
Step 6. Click in “Mail” tab. Just accept the defaults if no adjustments is required. See
image below.
8
Step 7. Click in “Address” tab, Enter internet addres and internet domain
As shown below.
Step 8. Under the “ID Info” tab make sure to set the “Certificate expiration date” (the
expiration where the user will neeed to be certified to allow access again), “License type”
to “International” and check the “In file” checkbox option (to backup user id file in the file
system). See image below.
9
Step 9. After entering all the required information, click the “Check” button to enter the
user being registered in the registration que. Click on “RegisterAll” or “Register” to
complete the registration process. See image below.
Step 10. Under the dialog window, click on the “OK” button to complete the registration
process.
Step 11. As you can see in the image below, under the People view, the new user has been
registered
10
b. Rename a User
Step 1. Under the “People and Group” tab > “People” section on the left pane, select the
user to be renamed then . expand the “Tools” section > “People” subsection in the right
pane then click “Rename” option. See image below.
Step 2. Under the “Rename selected Notes People” dialog, click “Change Common
Name” button and also set the no. of days the previous name will be honored on the
system.
Step 3. Under the “Choose a Certifier” dialog, delect the certifier id to initiate the rename
process then click “OK” button.
Step 4. Enter password for the certifier ID then click the “OK” button.
11
Step 5. Adjust the user access expiration date if necessary or just click the “OK” button to
continue. See image below.
Step 6. Rename the target user as show below then click the “OK” button to complete the
process.
Step 7. As you can see in the image below the rename process was successful. Click on
“OK” button to continue.
Note: An administration request process task will run every hour to process fully
the rename request or you can send a “tell adminp process all” command on the
domino console to rename the target person in the address book immediately.
12
c. Delete a User
Step 1. Select the target user in the address book then expand the Tools > People section clicking
the “Delete” option.
Step 2. Accept the default below then click the “OK” button to complete the process.
Step 1. Under the “People” view, select the target user then expand “Tools” > “ID Vaults” section
select the “Reset Password” option.
13
Step 2. Under the “Reset User’s Password” dialog, you can modify the “How to notify”
field either in person or via e-mail. Set new password as show below then click “Reset
Password” button to continue.
Note:
Both the HCL Notes user password and Internet password will be
changed.
Wait for atleast two (2) minutes for the new password to take effect then
try authenticating the user.
ID vault must be configured first before performing this procedure.
2. Group Maintenance
a. Group Creation
Step 1. Under the “Group” view select “Add Group” button. See image below.
14
Step 2. Enter “Group Name” then click the inverted triangle Icon to add members as
shown below.
Step 3. Select the users to be included in the group then click “Add” button as shown
below.
Step 4. As you can see after clicking the “Add” button, all selected names has been entered
to the “Names” field. Just click the “OK” button to add them to the group.
15
Step 5. As you can see the selected users has been added to the “Members” field. Click
“Save & Close” button to complete the process. See image below.
Step 6. As you can see the group created has been added to the “Group” view.
b. Deleting Group
Step 1. Under the “Group” view, select the target group to be deleted then under the
“Tools” pane > Groups subsection select “Delete” option.
16
Step 2. Under the Group dialog select the “Delete groups from this Domino Diretory
immediately” option then press “OK” button to complete the processs.
a. Basic Tab – Defines the basic information of the Domino Server. Mostly all fields here is
being accepted as a default except modifying the “Maximum fault limits” field and “Mail
Fault notification to” field to notify the administrator that the server has been shutdown
unexpectedly because of a fault or illegal operation.
c. Ports Tab – Controls the connections of all Domino Services from and to the Domino
Server.
d. Server Tasks Tab – Controls the operation of all Server tasks from Administration
Process, Agent Manager and other processes.
18
e. Internet Protocols Tab – Controls all Internet services related settings to access the
Domino server over the internet.
f. Transaction Logging Tab – Controls how the Domino Server performs auto recovery of
corrupted database server.
Replication is easily understood when you compare it to the traditional file copy process,
which is an all-or-nothing operation. For example, imagine you have a discussion database
on Server A that also needs to exist on Server B. To accomplish this task, you copy the
database from Server A to Server B, and you're done. You have a problem, however, once
users start adding documents to either copy of the database -- they're no longer in sync.
You could re-copy the database from Server A to Server B, but that would wipe out all of
the changes made to the database on Server B. So, how do we maintain a single database
in multiple locations in a synchronized fashion? The answer is replication.
The Replicator server task: This task appears on the server console as
REPLICATOR, and does the work of synchronizing a source database with its
replicas. By default, one instance of this task is loaded when the server is
started; however, you can add setting to the NOTES.INI file (REPLICATORS=
n), or use a server console command (LOAD REPLICA) to enable multiple
replicators.
This feature allows a server to replicate its databases with more than one server
at a time. For example, if a server has REPLICATORS=2 set in the
NOTES.INI, then it can replicate its databases with two servers simultaneously.
If, however, you enable two replicators, and the server only needs to replicate
with one other server, then only one replicator is used. The other Replicator
task remains idle.
Connection documents: These documents are in the Public Address Book, and
allow you to schedule replication between two servers (an exact time or a
range of time). Along with controlling the replication schedule, a Connection
document also controls which databases replicate and the type of replication
they use. The following is a list of the different types of replication:
Step 1. Access “Configuration” tab > Connections > “Connections View” as shown in the
image below. Click the selected connection to view its settings.
Step 2. The image below show the connection between Source Server to Destination
Server. Click on “Replication/Routing” tab to continue.
21
Step 3. To Start communication between the Source and Target server make sure the
“Replication Task” field is set to “Enabled” and select “Files/Directory paths to replicate”
field to the values of target database to sync with the destination server. See image below.
Step 3. Under the “Schedule” tab set the following fields below to enable and manage the
schedule of synchronization of database between servers. Save the document when all was
set.See image below.
- Email threading
- Contact cards
- Applications
Domino applications enable people to share, collect, track, and organize
information, using Lotus Notes® or the Web. Using HCL Domino Designer,
developers can create applications to meet a variety of business needs, including:
Dynamic applications that produce content based on, for example, user
name, user profile, access rights, or time of day.
- Databases
All Notes applications contain one or more databases. You create a database to use
as the container for the data, logic, and design elements in your application.
Design elements include:
Framesets
Pages
Forms
Views
Folders
Agents
Web Services
Outlines
Shared Resources
Composite Application Components
Navigators
23
3. Database Types
-NSF (Notes Storage Facility) – Represents all active applications or database that
reside in the Domino Server. e.g. names.nsf, admin4.nsf
-NTF (Notes Template File) – Represents an application template which active
database in the domino server inherits its design including program flow. e.g.
mail85.ntf,pubnames.ntf and admin4.ntf
-BOX – Represents the main mailbox database use by the Domino Server to route e-
mail within the Domino Server and to the internet.
e.g. mail.box
-Busytime.nsf
It holds a summary of the entries from individual calendars sufficient to
provide a response to scheduling enquiries about users' availability for
meetings etc. If the database is missing, it can be easily created once you
restart the server.
-Catalog DB (catalog.nsf)
Besides allowing users to see what databases are on a particular server, catalogs
provide useful information about databases. For each database in a view, a
Database Entry document provides information such as file name, replica ID,
design template, database activity, replication, full-text index, and ACL, as well
as buttons that let users browse the database or add it to their bookmarks. In
addition, the document displays a link to the database's Policy (About This
Database) document, which, for Database users are not authorized to access,
they can view by sending an e-mail request to the database manager.
-Events DB (events4.nsf)
Provides you with a set of tools to provide information when problems occur.
When a server runs the LDAP service, the Domino Directory is accessible through the
Lightweight Directory Access Protocol (LDAP).
Typically, a Domino Directory is associated with a Domino domain. When you set up the
first server in a Domino domain, Domino automatically creates the Domino Directory
database and gives it the file name NAMES.NSF. When you add a new server to the
domain, Domino automatically creates a replica of the Domino Directory on the new
server.
You can also create a Domino Directory manually from the PUBNAMES.NTF template
and use it as a secondary directory to store, for example, entries for your Internet users.
To optimize its performance, the Domino Directory has these database properties enabled
by default:
Step 1. Using the Domino Admin client access the “Files” tab. Selet the target
database.
Allows management of security access within a database (NSF) file.
Step 4. Select the person or group that you want to give access to then click “Add” button.
27
Step 5. Select the person you added from the list then on the right side set User Type and set
access control. Click the “OK’ button to finish.
Step 1. In the “Files” Tab select the target database for replication then do a right mouse click,
select “New” option then “Replica
28
Step 2. If you can’t find the target Domino Server to create a replica of the target database,
select other then click “Add” button.
Step 3. Under the name field type or lookup the target server for the replica of the database to
be created. Click “OK” button to continue.
Step 4. Make sure to check the “Exchange Unread marks on replication” option then
click on “OK” to finish.
29
c. File (NSF) Other maintenance tasks
1. Repair corrupted database file enter “load updall <name of db.nsf> -R” where “name of
db.nsf” represents the database name. Mostly to repair user access problem “load updall
names.nsf –R” resolves it.
D. Policies
Policy Implementation
There are two primary considerations when implementing policy documents: what the settings
are and which users the settings apply to. First, you need to determine all the configuration
settings to be applied to the Lotus Notes client. Once you have identified these settings, your
second task is figuring out how to apply the settings to the user community. You need to
determine which users or groups of users should be assigned a particular policy, which
subsequently contains a number of configuration settings known as settings documents.
Policy-based system administration is a way to centrally define, organize, and manage the
policy-related information and settings stored in the Domino Directory. This article looks at
policy hierarchies, tools and examples of using policies.
In previous Domino/Notes releases, creating and managing a standard environment for all your
users usually involved maintaining a set of written corporate policies. (An example of a policy
might be a specific security configuration you want every Notes user to follow, covering things
such as minimum password length and certificate expiration dates.) You would then use these
policies to guide you as you entered settings for users throughout your site. If you were
anything less than 100 percent familiar with every single setting, sooner or later you'd probably
end up making some small, but crucial data entry error, one requiring hours or possibly days to
correct. Perhaps you might identify with the plight of the administrator registering 1,000 users
with the wrong Internet address format, resulting in hours spent editing each Person document
30
containing the offending information. Those of you who know your way around LotusScript (or
are on friendly terms with someone who does) might be able to create an agent to distribute at
least some of this policy information corporate-wide. But wouldn't it be great if right out of the
box, Domino gave you an automated way of enforcing such standards accurately and easily?
If you think so, you're in luck. Domino 8.5.x helps you solve the problem of applying and
managing standard corporate policies by providing a new
technology called policy-based system administration. This feature gives
you a way to centrally define, organize, and manage user settings throughout your organization.
All information required for policy-based system administration is stored in your Domino
Directory, giving you a single place to control administration activity, from user setup to mail
archiving.
In Domino , you enforce corporate policies through individual Policy documents and Settings
documents in the Domino Directory. To create a
policy, you use a Policy document to specify which Settings documents to include.
A Policy document (see the following screen for an example) defines a set of corporate
information you want to apply to your users. It does this by specifying which Settings
documents to include in the policy. Each Settings document contains detailed information
applicable to a specific area of Domino administration, for example archiving or security. This
information defines user settings for that area. See figure G-1.
You can consider policy-based system administration as a way to create and apply rules within
your user community. The Settings documents contain the rules; the Policy document
organizes these rules. So when you create a Policy document, you have a single place to list
these rules. You can then apply the rules to establish and enforce administrative standards by
distributing them throughout your organization. And to change an existing policy, all you need
to do is edit the Policy document
and/or one or more Settings documents. No more running around to each
user's computer, making the same change over and over-you can now do this all centrally.
You can use policy-based system administration to manage five major areas of Domino
administration: archiving, desktop, setup, registration, and security:
31
Policy area Major features Description
Archiving Server-to-server Archive settings control mail file
archiving archiving. These settings
Server-to-local determine whether or not to
archiving allow archiving, and if you do
Folder-based allow archiving, whether or not to
archiving allow Notes users to set their
own private archiving criteria.
Desktop Welcome page Desktop settings control the
Deployment user's desktop environment.
Bookmarks They are applied to a user's client
management configuration during
Client upgrades authentication whenever a
change to the policy occurs.
Setup Browser Setup settings help configure a
Proxy new Notes client. They are used
Applet security only once, during the initial Notes
Preferences client setup to populate the
user's Location document and
bookmarks.
Registration Mail template Registration settings predefine
Password the User Registration options, if
length/quality your policies are in place before
Internet address you register users.
format
Certificate
expiration
Security Password Security settings establish the
expiration administration ECLs and define
ECL management password management options,
Password length including synchronization of
Internet and Notes passwords.
a. Click the People & Groups tab and open the Policies view.
b. Click Add Policy.
c. In the Basics section, enter a name for the policy. If you are creating an explicit
policy, enter a unique name. If you are creating an organizational policy, enter a
name in one of the following formats:
For Organizations: */<organization>
For Organizational Units: */<organizational unit>/<organization>
For hosted organizations: */<hosted organization>
g. For hosted organizations to indicate all hosted organizations in the Domino
Directory: *
h. Choose Explicit or Organizational as the policy type. Choose Explicit to create a
policy that you assign to specific users and groups. Choose Organizational to create
32
a policy to assign to all users in an Organization or Organizational Unit (OU). (See
the Organizational and explicit policies section for more information.)
i. Optionally, enter a short description of the policy.
j. To create a child Policy document at this time, click Create Child. This creates a
new Policy document that includes the name of the parent policy. You can save this
new child Policy document and return to it at a later time. When you close this
document you return to the parent Policy document.
k. In the Setting Type section, select the Settings documents (registration, setup,
archiving, desktop, and security) you want to apply to this policy. These can be
existing Settings documents you created earlier, or you can create new Settings
documents on-the-fly by clicking New and completing the Settings document form.
l. Save and close the new Policy document.
a. Select the People & Groups tab and open the Settings view.
b. Click Add Settings.
c. Select the type of Settings document you want to create
(registration, setup, archiving, desktop, or security).
d. Complete the fields appropriate to the settings type, and then save and close the
document.
Explicit policies assign settings to people and groups across different organizations. An
explicit policy is assigned in the Person document and applies to a group of users when an
Organization or OU does not exist to define the group. Explicit policies are most
appropriate for
33
When deciding which type of policies to use, consider the following suggestions:
Once created, organizational policies are automatically assigned to users, based on the
certifier. Explicit policies, on the other hand, must be assigned manually. You can assign
explicit policies during user registration, in the Person document, or by using the Assign
Policy
tool. It's best to create organizational policies prior to user
registration; the best time to assign explicit policies is during user
registration. If you don't create your policies before you register users, you can't apply
registration policy settings. Applying policies at registration time also ensures that setup
policy settings are available when the registered users perform Notes client setup.
Because organizational and explicit policies are hierarchical, inheritance and enforcement
automatically fit into a parent-child relationship. This model gives you the ability to define
corporate-wide standards inherited by Organizational Units while allowing for the
34
occasional exception. Just imagine, you can have an archiving policy in which your end
users have no control, some control, or complete control of where and how their mail
files are archived.
In this illustration, the top-level Policy document represents the policy you want to
enforce in your organization. The subordinate Settings documents (for archive,
registration, desktop, and
setup) contain the settings information that apply to this policy. You can think of these
Setting documents as buckets of information containing settings that in previous releases
had to be entered through many different places within the Domino and Notes user
interface. The Policy document dips into these buckets to derive the settings needed to
apply to the appropriate users and groups.
Knowing the relationship between Policy documents and Settings documents is crucial to
understanding two important features of policy-based administration: policy hierarchies
and effective policies.
35
Policy hierarchies
Let's forget about Domino 6 and policy-based system administration for a moment and
consider a typical large corporation. This company has rules that apply to all employees
and rules that apply to some departments and not others. Some workgroups within those
departments have their own rules, with some members exempt. And there are rules for
particular types of employees, for example, contractors and managers. This may sound
complex, but policy-based system administration can make sense of it all through policy
hierarchies.
For example, if you want all users to use the same Internet mail name format, set that
value in the Registration Settings document for the
top-level parent policy. After you do this, you don't have to change or reenter it in
subsequent child policies. You instead just instruct the child policy to inherit this value
from its parent. However, if your organization includes a group of international users for
whom this setting is a problem, you can create an explicit policy that applies only
to this group. The combination of explicit and organizational policies together provide the
control and the flexibility you need.
Policies inherit and enforce all settings at the field level. Two checkboxes are provided for
each field that can be inherited or enforced. The following screen shows how each field in
the Archive Settings document can either inherit its value from its parent or enforce a
setting to all of its children:
36
Figure G-3: Archive Settings
Effective policies
In a hierarchical policy structure, settings that apply to a particular group or user may not
be from a single Policy document. Instead, policy information may be derived from
multiple documents, based upon inherited and enforced settings (or even exception policies
if they're used). This derived set comprises the user's effective policy.
The effective policy consists of policy settings dynamically calculated at the time of
execution. The field values in an effective policy may originate from many different
Settings documents. Each hierarchical level can have an associated policy, so users may
have a combination of policy settings that include the values set at their OU level, and
those inherited from a parent policy. The resolution of these settings, stepping up through
the organizational hierarchy, creates the effective policy for each user.
In the end, it's the user's effective policy that determines which settings apply. So even
though the effective policy doesn't actually exist in the same sense a Policy document
does, it's nevertheless among the most crucial concepts you need to fully understand how
policy-based administration works.
Because the effective policy settings are derived at execution time, it may not always be
obvious what effect changing a value of a policy setting will produce. The Policy Synopsis
report shows the policy from which each of the effective settings is derived. This helps you
better understand the settings of individual policies, Setting documents, and effective
policies; and how they relate and affect each other.
Assign Policy
The Assign Policy tool gives you the ability to assign explicit policies. With this tool,
you can assign an explicit policy to a user or group, or you can change the explicit
policy assignment. The Assign Policy tool lets you make changes to multiple users or
groups, by associating an explicit policy with a person or group. When you change the
explicit policy for a user or group, Assign Policy gives you the option of viewing how
the change impacts the effective policy for that user or group.
For example, let's suppose your company has a group in the Domino Directory called
Executives. Imagine the group contains high-level managers and VPs from different
organizations and OUs within the company. Your corporate policy states that all
executives must follow a strict mail archiving policy. Here's an example of a few of the
people in the Executives group:
Sandy Beech/Sales/Acme
Lee Smith/Acme
Fran Jones/Development/Acme
In this example, each person has a different organizational policy for archiving their
mail:
So you create a new explicit policy called /Executives and make it an exception policy.
You then use the Assign Policy tool to assign the policy to each member in the
Executives group:
a. From the Domino Administrator, click the People & Groups tab.
b. Open the People view and select the users to whom you want to assign policies, or
open the Groups view and select the groups to which you want to assign policies.
c. From the Tools pane, click People or Groups (depending on your selection in the
previous step), and then select Assign Policy.
d. Complete the Assign Policy Options dialog box appropriately.
38
Figure G-4. Assign Policy Options dialog box
e. Optionally, click the View Policy Synopsis button to see the new effective policy
for the group or users to which you are assigning this policy.
f. In the Choose Organizational Policy dialog box, select the
Organizational policy you want to combine with the explicit policy to create the new
effective policy.
After the Assign Policy tool populates the explicit policy field in each Person
document in the Domino Directory, the inheritance tree for the users above now looks
like this:
View Policy
The View Policy tool lets you view your policy hierarchy and the relationships
between policies and policy Settings documents. You can also view the effective policy
for a selected user or group.
The View Policy tool has two views, which you access from the Configuration tab of
the Domino Administrator. The By Hierarchy view shows the hierarchy of policies, and
the settings associated with each one in the hierarchy. Use this view to display all
policies, see details of
a policy, or see which policies are assigned to a particular user or group. Here is an
example of the By Hierarchy view:
39
Figure G-5: By Hierarchy view
The By Settings view shows policy Settings documents for each administrative area and
the Policy documents that use each Settings document. Use this view to see where each
setting is used and how a change to the setting affects other policies. Here's an example of
the By Settings view:
The Policy Synopsis tool determines the effective policy governing a selected individual and
then creates a report that lists the policies and settings that apply to that user. Reports appear in
a database called Policy Synopsis Results (polcysyn.nsf). You can create two types of reports,
Summary and Detailed. Summary reports display the policy hierarchy, listing both the
organizational and explicit Policy documents used to derive the effective policy settings for
the specified user. Detailed reports include everything in the Summary, plus actual settings in
the effective policy.
a. From the Domino Administrator, click the People & Groups tab.
b. Select the People view.
c. From the Tools pane, select Policy Synopsis.
d. Complete the Policy Synopsis dialog box.
e. Click Results Database to define the server location and file name of the Policy
Synopsis Results database.
f. Click OK. When the Results database opens, double-click the
report to read it.
Let's take a look at what a section from a sample Policy Synopsis for a
person might look like:
*
*/Acme
*/Sales
Archive Settings:
NoArc = 0 from Company Wide assigned in policy * NoPrivArc = 0 from
Company Wide assigned in policy * ArcLoc = 2 from Acme Org assigned in
policy */Acme ArcSrcChcs = 2 from Acme Org assigned in policy */Acme
ArcLocChcs = 2 from Acme Org assigned in policy */Acme ArchSrcServer does
not have a value set
ServerName = bbalfe4/DNA from Sales Archive Settings assigned
in policy */Sales/Acme
41
This synopsis was run prior to assigning any explicit policy to show the effect of different
values inherited from difference policies within the ancestor hierarchy.
Registration settings
Acme Corporation has numerous company policies. Among other things, to ensure customers can easily
send email to your employees, all users must have the same Internet mail address format. Employees
are to use Lotus Notes as their default mail system. And you want to enforce a standard password
quality and certificate expiration date
across the corporation. To do this, create a Registration Settings document (let's call it
Acme_Default_Registration), and enter all this information into it. You select the mail template to use,
and specify that certificates expire after 24 months. You can then choose Acme_Default_Registration as
the Registration Settings document for
*/Acme. This means that by default, the information in
Acme_Default_Registration applies to all Acme employees at registration time.
42
Figure G-8. Registration Settings for Acme_Default_Registration
But as with most companies, Acme has exceptions to every rule. For example, your on-
the-go, multinational Sales force needs its own mail template. Further, Sales members are
roaming users and require a different Internet mail address format. No problem-just create
an organizational policy for your Sales OU called */Sales/Acme. Then create a
Registration Settings document called, for instance, Sales_Registration; and enter the
registration information appropriate to the Sales group. These settings will apply whenever
you register a user with the Sales/Acme certifier.
So far so good. But here's a twist: Acme corporate policy calls for certificates for all
contractors to expire after 6 months, not 24. However, these contractors are spread
throughout your OUs. You can't create an organizational policy that covers all contractors.
Instead, create an explicit policy, which you can name /Contractors.
43
Figure G-10: Policy document for Contractors
Then create a new Registration Settings document for the /Contractors policy called, for
example, Contractor_Settings. Enter the 6-month certificate expiration setting and any
other information that applies to your contractors.
To have these settings applied to contractors at registration time, open the contractor's
Person document and type /Contractors in the
Assigned Policy field.
By now, you've probably caught on: policies make all this much easier to implement than in
previous releases. No more trusting your users to select all the right preferences. No more days
spent visiting one user
at a time to verify that everything's set up correctly. Instead, just
create Setup and Desktop settings documents for your */Acme policy, and fill in this
information. These settings will then apply to all users in your corporation. And as mentioned,
you can handle exceptions to these rules using organizational and/or explicit policy documents.
44
Figure G-12: Setup Settings for Acme_Default_Setup