Bookshelf Home | Contents | Index | Search | PDF | ![]() ![]() ![]() ![]() |
Security Guide for Siebel eBusiness Applications > Security Adapter Authentication > Siebel Security Adapters >
Security Adapter Deployment Options
This section describes security adapter options that can be implemented in a security adapter authentication environment or in a Web SSO environment. Unless noted otherwise, these options are supported by the Siebel LDAP and ADSI adapters and by adapters that comply with Siebel Security Adapter Software Developers Kit 7.
- Remote configuration. The configuration parameters for a security adapter are stored in a centralized file that can be accessed on the network.
- Checksum validation. Verifies that the security adapter loaded by the authentication manager is the correct version.
- User Password Encryption. Maintains an unexposed, encrypted password in the directory, while an unencrypted version of the password is provided to the user for logging in. When enabled, a simple encryption algorithm is applied to the password before it is sent to the database.
- Credentials password encryption. The password set for the database account is encrypted, while an unencrypted version is stored in the directory and is used elsewhere in the authentication process.
- Application user. A designated entry in the directory is the only user with search and write privileges to the directory.
- Application User Password Encryption. You can maintain an unexposed password for the application user in the directory, while an encrypted version of the password is used in other phases of the authentication process. When enabled, a simple encryption algorithm is applied to the application user password before it is sent to the database. The application user login must also be set up with the encrypted version of the password.
Additionally, you can choose to store users' Siebel responsibilities as roles in a directory attribute instead of in the Siebel Database.
For information about the authentication options and procedures for implementing them, see Authentication Options.
Bookshelf Home | Contents | Index | Search | PDF | ![]() ![]() ![]() ![]() |
Security Guide for Siebel eBusiness Applications Published: 23 June 2003 |