Security Guide for Siebel eBusiness Applications > Security Adapter Authentication >

Implementing LDAP and ADSI Security Adapter Authentication


You can set up your authentication architecture to authenticate a user for access to a single Siebel application when the user does either of the following:

NOTE:  For a particular Siebel application, when users connect from the Siebel Dedicated Web Client to the server database, the authentication mechanism must be the same as that used for Siebel Web Client users. This mechanism could be database authentication or a supported external authentication strategy, such as LDAP or ADSI. When connecting to the local database from the Mobile Web Client, mobile users must use database authentication.

For information about authentication options for local database synchronization for mobile users, see Siebel Remote and Replication Manager Administration Guide.

To provide user access to a Siebel application on a Web site implementing security adapter authentication, the Siebel application must be able to extract the following from the directory:

Task Overview

You must do the following tasks to set up a typical security adapter authentication architecture:

Siebel Systems provides an LDAP/ADSI Configuration Utility to help you configure a directory service for your Siebel applications. For more information, see Using the LDAP/ADSI Configuration Utility.

Siebel Security Adapter Authentication and Siebel Dedicated Web Client

In a Siebel LDAP or ADSI security adapter authentication implementation, you must set Siebel system preferences to provide the following capabilities:

For information about setting authentication-related Siebel system preferences, see System Preferences.

Deployment Options for Security Adapter Authentication

This section describes options that you can implement in a security adapter authentication environment that uses the Siebel LDAP or ADSI adapter only.

In addition to the options described here, you can also implement any of the options that are described in Security Adapter Deployment Options.

For information about authentication options and procedures for implementing them, see Authentication Options.


 Security Guide for Siebel eBusiness Applications 
 Published: 23 June 2003