Yep! Use the password recovery system. Here's how:
Have both the user.id you need to crack and your certification ID handy.
In Administrator, go to the Configuration tab. Then go to the Tools feature on the right (if it is displayed) or click on the word "Configuration" in the toolbar up top. From either of these choose the "Certification" menu. From it choose "Extract Recovery Password". It will ask for your certification ID and password first, then if successful, will ask for the user.id you need to which you need access. Once it has that, it will display a message window with a case-sensitive alpha-numeric code which acts as an "alternate" to the real password. Write it down.
Next, go to the top toolbar again. Choose FILE--TOOLS--RECOVER ID... At the pop-up window, choose the user.id file whose "alternate" password you have. A smaller window appears. Type in the precise case-sensitive alternate password, and OK it. If it is correct, the computer will then allow you to change the current password to something you can remember. Test your results to make sure the new password works.
I always keep an original copy of their ID file so that the issue you are having above does not happen.
Key recovery is the best way to proceed but I find that users simply do not obey the simple request.
Try hunting an old ID file down or look in their person document of your Domino Directory to see if a userid is still attached.
If you have none of the above - you will need to generate a new ID file for the user - but any encrypted e-mail will never be recoverable as it was encrypted with their public encryption key in their person document which will change when you generate a new ID. Also the private key in the old ID will not work with their public key so again will not be able to decrypted.
As always - make backups of all files, names.nsf etc before performing such a change.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.