#dominoforever | Product Ideas Portal

 

Welcome to the #dominoforever Product Ideas Forum! The place where you can submit product ideas and enhancement request. We encourage you to participate by voting on, commenting on, and creating new ideas. All new ideas will be evaluated by HCL Product Management & Engineering teams, and the next steps will be communicated. While not all submitted ideas will be executed upon, community feedback will play a key role in influencing which ideas are and when they will be implemented.

For more information and upcoming events around #dominoforever, please visit our Destination Domino Page

Enabling SSLCipherSpec via Notes.ini

The value in SSLCipherSpec is selected automatically in the Server documents or Internet Site documents of Domino 10.0.1 servers. The notes.ini setting on servers is ignored.

Request: Enable again the option to apply/modify the SSLCipherSpec via Notes.ini of the server.

This would be very helpful if you're require not to update the template prior to Domino 10.

  • Guest
  • May 29 2019
  • Shipped
  • Attach files
  • Guest commented
    7 Jun 05:19pm

    Thomas, are you saying that the V12 template is required to enable the notes.ini parameters ? The whole gist of this idea was to NOT require template upgrade to keep existing functionality.

  • Admin
    Thomas Hampel commented
    6 Jun 01:14pm

    Existing values are preserved and additional / newer Ciphers are introduced in the V12 template. Considering this idea to be shipped with V12

  • Guest commented
    9 Sep, 2019 08:56pm

    I do not see this as a heavy priority, as our company long ago switched to using Nginx in front of Domino to offload SSL, and add http/2 support, handle file streams. Unless they have significantly improved the Domino http stack there is no reason to use https on it.

  • Guest commented
    30 May, 2019 06:02pm

    This is the first time in my 25 year experience with the product that a template update is required to keep existing functionality. In the past template upgrades were only required to expose  new functionality. Breaking something as critical as SSL ciphers is unacceptable.