Bookshelf Home | Contents | Index | PDF |
Security Guide for Siebel Business Applications > Security Adapter Authentication > Security Adapter Deployment Options > Configuring Checksum ValidationChecksum validation for security adapters can be implemented in the following authentication strategies:
Checksum validation provides a check that each user who attempts to gain access to the Siebel Database has done so through the correct security adapter. You can implement checksum validation with the Siebel checksum utility that is included when you install your Siebel application. Checksum validation supports the following principles:
To configure checksum validation
NOTE: The checksum value in this procedure is an example only. You must run the checksum utility as described to generate the value that is valid for your implementation. In addition, you must recalculate the CRC checksum value and update the (For previous releases, the CRC checksum value was set using the Security Adapter CRC system preference, rather than a configuration parameter.) For information about setting Siebel configuration parameters, see Configuration Parameters Related to Authentication. |
Security Guide for Siebel Business Applications |