Bookshelf Home | Contents | Index | Search | PDF |
Security Guide for Siebel eBusiness Applications >
User Authentication Overview
This section presents information and instructions on setting up your authentication infrastructure. Its content includes:
- An overview of authentication strategies.
- A summary of centralized information locations: configuration parameters and seed data that you use throughout the section.
- A section about database authentication and its implementation.
Additional sections in this book are provided with information on:
- External authentication and security adapters.
- Two principal external authentication strategies, including a scenario in each that describes the setup of a specific authentication architecture.
- Instructions for implementing all available authentication options.
- Referential information about parameters that are provided to implement various authentication strategies and options.
- Login features and cookies.
To implement your authentication infrastructure, use these sections in the following way:
- If you are undecided about the basic authentication strategy to implement, read the general overview material and the overview material in the section for each authentication strategy.
- If you are unfamiliar with or undecided about the components and options to implement in your authentication architecture, read the descriptions of available options for security adapters, each authentication strategy, and, optionally, the section on implementing authentication options.
- Use the setup scenarios in the sections for each external authentication strategy as an aid to set up your own authentication architecture.
- When you set up your authentication strategy in a development environment, use the referential information about parameters and seed data as needed.
Referential and procedural information in each of the following topics relates to all three authentication strategies. Much of the specific information in these topics applies to more than one authentication strategy. Some of the information applies to both authentication and user administration.
- Seed data. When you install your Siebel eBusiness Applications, you are provided seed data that is related to authentication, to user registration, and to user access to Siebel applications. For detailed information on the seed data that is provided and for procedures for viewing and editing seed data, see Seed Data.
- Configuration parameters related to authentication. Configuration parameter values determine how your authentication architecture components interact. For information about the purposes of configuration parameters and procedures for setting their values, see Configuration Parameters Related to Authentication.
- Authentication options. Each authentication strategy has options in the way it can be implemented. For information about the authentication options and procedures for implementing them, see Authentication Options.
Bookshelf Home | Contents | Index | Search | PDF |
Security Guide for Siebel eBusiness Applications Published: 23 June 2003 |