Bookshelf Home | Contents | Index | PDF |
Siebel Security Guide > Security Adapter Authentication > Comparison of Authentication StrategiesTable 10 highlights the capabilities of each authentication approach to help guide your decision. Several options are available for each basic strategy. NOTE: Comparisons do not apply for Siebel Mobile Web Client, for which only database authentication is available. |
Siebel Security Guide | Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Legal Notices. | |