Bookshelf Home | Contents | Index | Search | PDF | ![]() ![]() ![]() ![]() |
Siebel eAuction Guide > Configuring the Siebel eAuction Environment >
Using Third-Party Security
Security conventions implemented outside of the Siebel environment are still effective. For example, you should make sure that the operating system security (such as NTFS and IUSR_MACHINE) allows the Siebel Server access to needed files without compromising overall security goals.
Bookshelf Home | Contents | Index | Search | PDF | ![]() ![]() ![]() ![]() |
Siebel eAuction Guide Published: 18 April 2003 |