Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

End-to-End Encryption for Data Confidentiality
Controlling Access to Data
Support for Auditing in a Siebel Environment
Secure Physical Deployment to Prevent Intrusion
Security for Mobile Solutions
Secure Real-Time Wireless Communications
Mobile Device User Authentication
Security Settings for the Web Browser
Bibliography of Security References
Roadmap for Configuring Security
■ “Changing Passwords” on page 29
Changing Passwords
■ “Changing System Administrator Passwords on Microsoft Windows” on page 30
Changing System Administrator Passwords on Microsoft Windows
Changing the Siebel Administrator Password on UNIX
About the Gateway Name Server Authentication Password
Changing the Table Owner (DBO) Password
Troubleshooting Password Changes By Checking for Failed Server Tasks
Changing Passwords in the Siebel Management Framework
Changing the Siebel Diagnostic Tool User’s Password
To change the Siebel Diagnostic Tool user’s passw ord
Changing a Siebel User Account Password in the Siebel Management Framework
Changing the Siebel Enterprise Security Token
Managing Encrypted Passwords in the eapps.cfg File
Encrypting Passwords Using the encryptstring Utility
About Password Encryption
■ “About the Siebel Network” on page 45
About the Siebel Network
Firewall and Proxy Server Support
Role of Siebel Server Load Balancing in Networking Security
About Selecting Port Numbers
Restricting Access to Siebel Components
Physical Security of the Client Device
Database Server Access
Siebel File System Access
Auditing for Data Continuity
Securing Siebel Document Server
■ “Types of Encryption” on page 57
Types of Encryption
Configuring Secure Communications
About Certificates and Private Key Files Used for SSL Authentication
Installing Certificate Files on Microsoft Windows
Configuring Encryption for Siebel Enterprise and SWSE
Configuring SSL Mutual Authentication Using EAI HTTP Transport
Configuring SSL Encryption for a Siebel Enterprise or Siebel Server
Configuring SSL Encryption for SWSE
Adding New Encryption Keys
Upgrade Issues for Data Encryption
Upgrading Data to a Higher Encryption Level
Prerequisites for Upgrading to a Higher Encryption Level
Running the Encryption Upgrade Utility
About Siebel Strong Encryption Pack
Installing the Siebel Strong Encryption Pack
Increasing the Encryption Level
Reencrypting Masked Parameters
Security Considerations for Unicode Support
6 Security Adapter Authentication
■ “About User Authentication” on page 99
About User Authentication
Comparison of Authentication Strategies
About Siebel Security Adapters
Configuring Database Authentication
Implementing Database Authentication
About LDAP/ ADSI Security Adapter Authentication
LDAP/ADSI Authentication Process
Requirements for LDAP/ADS Directory
Installing LDAP Client Software
■ “Considerations for Secure LDAP Using SSL” on page 112
Considerations for Secure LDAP Using SSL
Installing the IBM LDAP Client and IBM GSKit on Windows
Installing the IBM LDAP Client and IBM GSKit on Solaris
Installing the IBM LDAP Client and IBM GSKit on AIX
Installing the IBM LDAP Client and IBM GSKit on HP-UX
Installing the IBM LDAP Client and IBM GSKit on Linux
Configuring the siebenv.csh and siebenv.sh Scripts for the LDAP Client
Configuring the IBM GSKit
Generating a CMS Key Database Using IBM GSKit
■ “About LDAP/ADSI Security Adapter Authentication” on page 106
■ “Implementing LDAP/ADSI Security Adapter Authentication” on page 122
Implementing LDAP/ ADSI Security Adapter Authentication
page 127
Setting Up Security Adapter Authentication: A Scenario
Creating a Database Login
Setting Up the LDAP/ADS Directory
Creating Users in the LDAP/ADS Directory
Editing Parameters in the eapps.cfg File
Editing Parameters Using Siebel Server Manager
Editing Parameters in the Application Configuration File
Setting a System Preference for Developer Web Clients
Restarting Servers
Testing the LDAP/ADSI Authentication System
Configuring Password Hashing
Login Scenario for Password Hashing
Usage Guidelines for Password Hashing
Configuring User and Credentials Password Hashing
Running the Password Hashing Utility
Security Adapter Deployment Options
Configuring the Application User
Configuring Checksum Validation
Configuring Secure Communications for Security Adapters
Configuring the Shared Database Account
Configuring Adapter-Defined User Name
Configuring the Anonymous User
Configuring Roles Defined in Directory
Security Adapters and the Siebel Developer Web Client
Authentication for Mobile Web Client Synchronization
Authentication for Gateway Name Server Access
Securing Access to Siebel Reports
Configuring Server Component Authentication
Configuring LDAP Authentication
■ “Setting the User Credentials for the BI Publisher Server” on page 167
■ “Creating User Roles in the LDAP Directory” on page 167
7 Web Single Sign-On Authentication
■ “About Web Single Sign-On” on page 169
About Web Single Sign-On
Implementing Web SSO Authentication
Scenario for Setting Up Web SSO
Process of Implementing Web SSO
Creating Protected Virtual Directories
Setting Up the Active Directory Server
Creating Users in the Directory
Adding User Records in the Siebel Database
Editing Siebel Gateway Name Server Parameters
Configuring a Siebel Web Client to Use SSL
Cookies and Siebel Business Applications
Auto-Login Credential Cookie
Siebel QuickStart Cookie
Enabling Cookies for Siebel Business Applications
■ “About User Registration” on page 199
About User Registration
Configuring Anonymous Browsing
■ “About Anonymous Browsing and Unregistered Users” on page 200
About Anonymous Browsing and Unregistered Users
Implementing Anonymous Browsing
Configuring Views for Anonymous Browsing or Explicit Login
About Self-Registration
Implementing Self-Registration
Modifying the Anonymous User Record
Setting Configuration Parameters for Self-Registration
Activating Workflow Processes for Self-Registration
Modifying Self-Registration Views and Workflows
Replacing the License Agreement Text
Managing Duplicate Users
Managing Forgotten Passwords
■ “User Experience for a Forgotten Password” on page 217
User Experience for a Forgotten Password
Defining Password Length for System-Generated Passwords
Architecture for Forgotten Passwords
Modifying the Workflow Process for Forgotten Passwords
Modifying Workflow Process to Query Null Fields
Modifying Workflow Process to Request Different Identification Data
User Administration ■ Internal Administration of Users
Internal Administration of Users
User Authentication Requirements
Adding a User to the Siebel Database
Adding a New Employee
Adding a New Partner User
Adding a New Contact User
Promoting a Contact to a Contact User
New Responsibility Field for User Record
Delegated Administration of Users
User Authentication Requirements for Delegated Administration
Access Considerations for Delegated Administration
Maintaining a User Profile
Editing Personal Information
Changing a Password
Changing the Active Position
10Configuring Access Control
■ “About Access Control” on page 239
About Access Control
Access Control for Parties
Access Control for Data
Access Control Mechanisms
About Personal Access Control
About Position Access Control
About Single-Position Access Control
About Team (Multiple-Position) Access Control
About Manager Access Control
About Organization Access Control
About Single- and Multiple-Organization Access Control
About Suborganization Access Control
About All Access Control
About Access-Group Access Control
Planning for Access Control
Access Control and Business Environment Structure
Benefits of Multiple Organizations
Planning for Divisions
Planning for Organizations
Planning for Positions
Planning for Responsibilities
Implementing Access Control
Applications and Access Control
Setting Up Divisions, Organizations, and Positions
Responsibilities and Access Control
Business Component View Modes
Business Component View Mode Fields
Applet Access Control Properties
View Access Control Properties
Example of Flexible View Construction
Implementing Access-Group Access Control
Scenario That Applies Access-Group Access Control
The User’s Experience
Administrative Tasks
Administering Catalogs of Data
Administering Access Groups
Associating Access Groups with Data
Managing Tab Layouts Through Responsibilities
Administering Tab Layout
Assigning a Primary Responsibility
Exporting and Importing Tab Layouts
Administering Access Control for Business Services
■ “Associating a Business Service with a Responsibility” on page 296
■ “Associating a Responsibility with a Business Service” on page 297
Associating a Business Service with a Responsibility
Associating a Responsibility with a Business Service
Example of Associating a Responsibility with Business Service Methods
Clearing Cached Business Services
To clear cached business services
Disabling Access Control for Business Services
To disable access control for business services
Configuring Access Control ■ Administering Access Control for Business Processes
Administering Access Control for Business Processes
Administering Access Control for Tasks
Associating a Task with a Responsibility
Associating a Responsibility with a Task
Clearing Cached Responsibilities
Additional Access Control Mechanisms
Configuring Visibility of Pop-Up and Pick Applets
Using the Visibility Auto All Property
Configuring Drilldown Visibility
How Parties Relate to Each Other
Person (Contact) Data Model
Employee Data Model
Position Data Model
Account Data Model
Division Data Model
Organization Data Model
Partner Organization Data Model
Household Data Model
User List Data Model
Access Group Data Model
■ “User Authentication Issues” on page 321
User Authentication Issues
User Registration Issues
Access Control Issues
B Configuration Parameters Related to Authentication
■ “Parameters in the eapps.cfg File” on page 327
Parameters in the eapps.cfg File
Authentication-Related Parameters
SSL-Related Parameters
Siebel Gateway Name Server Parameters
Parameters in the gateway.cfg File
Siebel Application Configuration File Parameters
System Preference
■ “Seed Employee” on page 349
Seed Responsibilities
Seed Position and Organization
Seed Database Login
■ “Siebel Financial Services Applications” on page 353
Siebel Financial Services Applications
User Authentication for Siebel Financial Services
LDAP and ADSI Security Adapter Authentication
Implementing LDAP and ADSI Security Adapter Authentication
Registering and Administering Users for Siebel Financial Services
Unregistered Users and Anonymous Browsing
External Administration of Users
Basic Access Control for Siebel Financial Services
Administering Access-Group Access Control
Configuration File Names for Siebel Financial Services Applications
Seed Data for Siebel Financial Services
0 of .
Results for:
No results containing your search query
P. 1


|Views: 5,521|Likes:
Published by canananthreddyn

More info:

Published by: canananthreddyn on Mar 14, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 8 to 13 are not shown in this preview.
You're Reading a Free Preview
Pages 21 to 69 are not shown in this preview.
You're Reading a Free Preview
Pages 84 to 183 are not shown in this preview.
You're Reading a Free Preview
Pages 191 to 382 are not shown in this preview.

Activity (5)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Mohamed Azar liked this
kiranusa liked this
tapan92 liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->