Security Guide for Siebel eBusiness Applications


Introduction

How This Guide Is Organized

Additional Resources

Revision History


Back to top


About Security Resources for Siebel Applications

Using Industry Standards

Siebel Security Architecture

User Authentication for Secure System Access

End-to-End Encryption for Data Confidentiality

Authorization to Control Data Visibility

Auditing for Data Continuity

Secure Physical Deployment to Prevent Intrusion

Security for Mobile Solutions

Bibliography of Security References


Back to top


Configuring for Security: Overview

Security Roadmap

Changing Default Passwords

Changing the SADMIN Password on Microsoft Windows

Changing the SADMIN Password on UNIX

Changing the Table Owner (DBO) and Password

Checking for Failed Tasks

Changing the Siebel Local (DBA) Password

Adding a Password for Updating Web Server Images

Security Settings for the Web Browser


Back to top


Physical Deployment and Auditing

Firewall Support

Recommended Placement for Firewalls

Resonate Support

Port Numbers

Restricting Access

Physical Security of the Client Device

Database Server Access

Siebel File System Access

Auditing for Data Continuity

Securing Siebel Reports Server

Reports Components

Configuring Reports Server for Security


Back to top


Communications and Data Encryption

Types of Encryption

Configuring for Encryption

Configuring Siebel Enterprise for Microsoft Crypto or RSA Encryption

Configuring Siebel Enterprise or Siebel Server for SSL Encryption

Configuring Siebel Web Server Extension for SSL Encryption

Configuring Web Clients for Encryption

Mobile Web Client: Encryption for Synchronization

Password Encryption

Business Component Encryption

RC2 Encryption Administration

Using Key Database Manager

If You Are Upgrading

Unicode Support


Back to top


User Authentication Overview

About User Authentication

Siebel Authentication Manager

Authentication Manager Overview

Authentication Manager Process Detail

Database Authentication Overview

Implementing Database Authentication


Back to top


Security Adapter Authentication

Siebel Security Adapters

Requirements for Directory

ADSI Adapter Requirements

Siebel Security Adapters and the Siebel Dedicated Web Client

Security Adapter Deployment Options

LDAP and ADSI Security Adapter Authentication

Implementing LDAP and ADSI Security Adapter Authentication

Setting Up Security Adapter Authentication: A Scenario

Creating a Database Login

Setting Up the Directory

Creating Users in the Directory

Adding User Records in the Siebel Database

Editing Parameter Values in the eapps.cfg File

Editing Parameter Values in the Application Configuration File

Editing Name Server Parameters

Setting System Preferences

Restarting Servers

Testing the External Authentication System


Back to top


Web Single Sign-On and Remote Authentication

Overview of Web Single Sign-On

Implementing Web SSO Authentication

Setting Up Web SSO: A Scenario

Creating Protected Virtual Directories

Creating a Database Login

Setting Up the Active Directory Server

Creating Users in the Directory

Adding User Records in the Siebel Database

Editing Parameter Values in the eapps.cfg File

Editing Parameter Values in the Application Configuration File

Editing Name Server Parameters

Setting System Preferences

Restarting Servers

Testing the Web SSO Authentication

Remote Authentication


Back to top


Authentication Details

Using the LDAP/ADSI Configuration Utility

Authentication Options

Roles

Secure Login

User Password Encryption

Credentials Password Encryption

Application User

Checksum Validation

Remote Configuration

Secure Adapter Communications

Shared Database Account

Adapter-Defined User Name

User Specification Source

Anonymous User

Secure Views

Digital Certificate Authentication

Configuration Parameters Related to Authentication

Parameters in the eapps.cfg File

Siebel Application Configuration File Parameters

Name Server Parameters

System Preferences

Login Features

Cookies and Session Management


Back to top


User Administration

Overview of User Registration

Unregistered Users and Anonymous Browsing

Implementing Anonymous Browsing

Overview of Self-Registration

End User Experience for Self-Registration

Implementing Self-Registration

Modifying the Anonymous User Record

Setting Configuration Parameters

Activating Workflow Processes

Modifying Self-Registration Views and Workflows

Replacing the License Agreement Text

Revising a Workflow Process

Creating Custom Business Services

Redefining Required Fields

Adding or Deleting Fields in an Existing View

Siebel Tools Tasks for Adding or Deleting Fields

Workflow Tasks for Adding or Deleting Fields

Changing the Physical Appearance of a View or Applet

Creating a New View

Modifying User Deduplication

Modifying Updated Fields

Modifying the Fields Used to Determine a Duplicate User

Deactivating the Duplication Check

Forgot Your Password?

The User Experience

Forgot Your Password? Architecture

Modifying Forgot Your Password?

Modifying Workflow Process to Make a Comparison of Null Fields

Modifying Workflow Process to Request Different Identification Data

Modifying the User Interface

Internal Administration of Users

Adding a User to the Siebel Database

Adding a New Employee

Adding a New Partner User

Adding a New Contact User

New Responsibility Field

Delegated (External) Administration of Users

Access Considerations for Delegated Administration

Registering Users—Delegated Administration

Registering Contact Users

Registering Partner Users

Maintaining a User Profile

Editing Personal Information

Changing a Password

Changing the Active Position


Back to top


Access Control

Access Control Overview

Access Control for Data

Access Control for Parties

Party Data Model

How Parties Relate to Each Other

About Access Control Mechanisms

Personal Access Control

Position-Based Access Control

Single-Position Access Control

Team-Based Access Control

Manager Access Control

Organization-Based Access Control

Single-Organization and Multiple-Organization Access Control

Suborganization Access Control

All Access Control

Access-Group Access Control

Planning for Access Control

Business Environment Structure

Setting Up Organizations

Setting Up Divisions

Setting Up Positions

Defining Responsibilities and Adding Views and Users

Implementing Basic Access Control

Application-Level Access Control

Responsibilities

Business Component View Modes

Business Component View Mode Fields

Applet Access Control Properties

View Access Control Properties

An Example of Flexible View Construction

Administering Access-Group Access Control

Scenario that Applies Access-Group Access Control

The User's Experience

Administrative Tasks

Administering Catalogs of Data

Administering Positions, Organizations, Households, and User Lists

Administering Access Groups

Associating Access Groups with Data

Managing Tab Layouts Through Responsibilities

Administering Tab Layout

Assigning a Primary Responsibility

Exporting and Importing Tab Layouts

Creating and Administering Roles

Creating Roles

Associating Tasks with a Role

Associating Users with Roles

Creating Role-Based Personalization

Additional Access Control Mechanisms

Configuring Visibility of Pop-Up and Pick Applets

Configuring Drilldown Visibility


Back to top


Troubleshooting Security Issues

Monitoring Application and User Activity

Siebel Web Server Extension Stats Page

Viewing Usage of Employee and Partner Applications

User Authentication Issues

User Registration Issues

Access Control Issues

Encryption Issues


Back to top


Seed Data

Seed Employee

Seed Users

Seed Responsibilities

Seed Position and Organization

Seed Database Login


Back to top


Addendum for Siebel Financial Services

User Authentication for Siebel Financial Services

Registering and Administering Users for Siebel Financial Services

Seed Data

Unregistered Users and Anonymous Browsing

Self-Registration

Internal Administration of Users

External Administration of Users

Maintaining a User Profile

Basic Access Control for Siebel Financial Services

Parties

Access Control Mechanisms

Administering Access-Group Access Control

Configuration File Names for Siebel Financial Services Applications

Seed Data for Siebel Financial Services

Seed Users

Seed Responsibilities

Back to top


 Security Guide for Siebel eBusiness Applications 
 Published: 23 June 2003