|
|
|
Anytime you bring third-party, or external, content into your deployment, you open security risks. Measures should be take to reduce these risks. |
|
|
|
Whenever users can interact with data from third-party applications and external services, security measures should be put in place to prevent unwanted access. |
|
|
|
IBM® Connections supports three major intersecting dimensions of security for gadgets: feature access, page object access, and proxy access. |
|
|
|
This article discusses the functional changes, data collection, and troubleshooting issues with respect to security in IBM® Lotus® Connections 3.0. |
|
|
|
This article explains how to set up Computer Associates SiteMinder with Lotus Connections 3.0. In this scenario, Lotus Connections is installed on a network environment with two nodes in a similar topology as that of the "Scenario 2: Installing Lotus Connections 3.0 - Large Network Deployment" ... |
|
|
|
This collection of articles describes the security features of Lotus Connections 2.5 and the Single Sign-On environments in which it will operate. [[http://www-10.lotus.com/ldd/lcwiki.nsf/dx/connections-2.5-security-knowledge-transfer-1|Security knowledge transfer for Lotus Connections 2.5 (Part ... |