Siebel Security Guide > Security Adapter Authentication > About Password Hashing >

Overview of the Login Process When Password Hashing Is Enabled


This topic describes the login process for a Siebel Business Applications user when password hashing has been implemented. For information on configuring password hashing, see Process of Configuring User and Credentials Password Hashing.

A user is logged into the Siebel application by the following process:

  1. The user logs in with user credentials that include the unhashed password.
  2. The AOM receives the user credentials and passes them to the authentication manager.
  3. The authentication manager hashes the password, according to the configuration of the security adapter.
  4. In a database authentication environment:
    1. The authentication manager passes the user credentials (user ID and hashed password) to the database security adapter.
    2. The database security adapter verifies that the hashed password matches the hashed password stored in the database for the user. It validates the credential by trying to connect to the database server. The security adapter confirms to the AOM, through the authentication manager, that the credentials are valid.
  5. In an LDAP or ADSI authentication environment:
    1. The authentication manager passes the user credentials, including the hashed password, to the LDAP or ADSI security adapter.
    2. The LDAP or ADSI security adapter verifies that the hashed password matches the hashed password stored in the directory for the user, and then returns the database account and the Siebel user ID to the AOM through the authentication manager.
  6. The AOM initiates a Siebel session for the user.
Siebel Security Guide Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Legal Notices.