Bookshelf Home | Contents | Index | PDF |
Security Guide for Siebel Business Applications > Security Adapter Authentication > Configuring Database AuthenticationIf you do not use LDAP/ADSI authentication, then you must create a unique database account for each user. When an administrator adds a new user to the database, the User ID field must match the username for a database account. The user enters the database username and password when the user logs into a Siebel application. Database Authentication ProcessThe stages in a database authentication process are:
Features Not Available for Database AuthenticationSome of the features that other authentication strategies provide are not available with database authentication, including:
Implementing Database AuthenticationIf you implement database authentication, it will typically be for a Siebel employee application, such as Siebel Call Center or Siebel Sales. Database authentication is configured as the default, and is the easiest to implement of the authentication approaches presented in this book. Although configuration may not be required, parameters for the database security adapter can be configured using Siebel Server Manager. To do this, you specify parameter values for a named subsystem (enterprise profile). For Developer Web Client, parameters are configured by editing the application configuration file. The database security adapter is specified using the
The CAUTION: If you want to configure a server component or a Siebel Server to use different database authentication settings than those already configured at a higher level (that is, configured for the Siebel Enterprise or Siebel Server), then you should create a new database security adapter. Otherwise, settings you make will reconfigure the existing security adapter wherever it is used. For more information about parameters for the database security adapter, see Configuration Parameters Related to Authentication. An administrator must perform the following tasks to provide a new user with access to Siebel Business Applications and the Siebel Database in a database authentication environment:
The following option is available if you implement database authentication:
|
Security Guide for Siebel Business Applications |