Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

How This Guide Is Organized
Revision History
Managing Security in Corporate Networks
Using Industry Standards
Siebel Security Architecture
sUser authentication for secure system access
User Authentication for Secure System Access
End-to-End Encryption for Data Confidentiality
Authorization to Control Data Visibility
Secure Physical Deployment to Prevent Intrusion
Security for Mobile Solutions
Bibliography of Security References
Security Roadmap
Checking for Failed Tasks
Changing the Siebel Local (DBA) Password
Adding a Password for Updating Web Server Images
Security Settings for the Web Browser
Firewall Support
Recommended Placement
Resonate Support
Port Numbers
Restricting Access
Physical Security of the Client Device
Database Server Access
File System Access
Auditing for Data Continuity
Securing Siebel Reports Server
Reports Components
Configuring Reports Server for Security
Types of Encryption
Configuring for Encryption
Configuring Siebel Server for Encryption
Configuring Web Clients for Encryption
Key Exchange in Siebel Applications
Session Cookies
Password Encryption
Business Component Encryption
Setting Encryption User Properties
RC2 Encryption Administration
Using Key Database Manager
Running Key Database Manager
Changing the Keyfile Password
If You are Upgrading
Unicode Support
About User Authentication
Siebel Authentication Manager
Authentication Manager Overview
Authentication Manager Process Detail
Database Authentication Overview
Implementing Database Authentication
Security Adapter Authentication
Siebel Security Adapters
Directory Requirements
ADSI Adapter Requirements
Siebel Security Adapters and the Siebel Dedicated Web Client
Security Adapter Deployment Options
LDAP and ADSI Security Adapter Authentication
Implementing LDAP and ADSI Security Adapter Authentication
Task Overview
Siebel Security Adapter Authentication and the Siebel Dedicated Web Client
Deployment Options for Siebel LDAP and ADSI Security Adapter Authentication
Setting Up Security Adapter Authentication: A Scenario
Restarting Servers
Testing the External Authentication System
To test your external authentication system
Implementing Web SSO Authentication
Deployment Options for Web SSO
Digital Certificate Authentication
Setting Up Web SSO: A Scenario
Creating Protected Virtual Directories
Creating Users in the Directory
Remote Authentication
Using the LDAP/ADSI Configuration Utility
Authentication Options
Secure Login
User Password Encryption
Credentials Password Encryption
Application User
Application User Password Encryption
Checksum Validation
Remote Configuration
Secure Adapter Communications
Shared Database Account
Adapter-Defined User Name
User Specification Source
Anonymous User
Anonymous Browsing
Secure Views
Configuration Parameters Related to Authentication
Eapps.cfg Parameters
Siebel Application Configuration File Parameters
Siebel Name Server Parameters
System Preferences
Login Features
Remember My User ID and Password
Account Policies
About Password Expiration
Cookies and Session Management
Cookieless Sessions
Overview of User Registration
Unregistered Users and Anonymous Browsing
Implementing Anonymous Browsing
Setting Configuration Parameters
The End User Experience for Self-Registration
Implementing Self-Registration
Activating Workflow Processes
Modifying Self-Registration Views and Revising Workflow Processes
Modifying Forgot Your Password?
To add or delete a field in the User Information form
Internal Administration of Users
User Authentication Requirements
Adding a User to the Siebel Database
The New Responsibility Field
External Administration of Users
Access Considerations
Registering Users
Maintaining a User Profile
Editing Personal Information
To edit personal information
Changing a Password
Changing the Active Position
Access Control Overview
sMaster data
sCustomer data
Party Data Model
How Parties Relate to Each Other
Access Control Mechanisms
Personal Access Control
Position-Based Access Control
Sales Team Access Control
Manager Access Control
Organization-Based Access Control
Sub-Organization Access Control
All Access Control
Planning for Access Control
Business Environment Structure
Defining a Company Structure
Implementing Basic Access Control
Application Level Access Control
Business Component View Modes
Applet Access Control Properties
View Access Control Properties
An Example of Flexible View Construction
Administering Access Group Access Control
A Scenario That Applies Access Group Access Control
The User’s Experience
Administrative Tasks
Administering Catalogs of Data
Administering Access Groups
Associating Access Groups With Data
Supplemental Access Control
Creating and Administering Roles
Configuring Visibility of Pop-Up and Pick Applets
sUse the visibility Auto All property
Configuring Drilldown Visibility
Merging Organizations
Monitoring Application and User Activity
Web Extension Stats Page
Viewing Usage of Employee and Partner Applications
User Authentication Issues
User Registration Issues
Access Control Issues
Encryption Issues
Configuration Files
Addenda for Siebel Financial Services
Seed Data
Siebel Application Configuration File Names
0 of .
Results for:
No results containing your search query
P. 1
Security Guide

Security Guide

Ratings: (0)|Views: 1,069 |Likes:
Published by rampanna

More info:

Published by: rampanna on Jan 05, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 9 to 29 are not shown in this preview.
You're Reading a Free Preview
Pages 38 to 107 are not shown in this preview.
You're Reading a Free Preview
Pages 116 to 236 are not shown in this preview.
You're Reading a Free Preview
Pages 245 to 405 are not shown in this preview.
You're Reading a Free Preview
Pages 414 to 438 are not shown in this preview.

Activity (5)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Granger Miller liked this
didu liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->