Siebel eAuction Guide > Configuring the Siebel eAuction Environment >

Using Third-Party Security


Security conventions implemented outside of the Siebel environment are still effective. For example, you should make sure that the operating system security (such as NTFS and IUSR_MACHINE) allows the Siebel Server access to needed files without compromising overall security goals.


 Siebel eAuction Guide 
 Published: 18 April 2003