Bookshelf Home | Contents | Index | PDF |
Siebel Security Guide > Security Adapter Authentication > About Siebel Security AdaptersWhen you install your Siebel Business Applications, these security adapters are provided for user authentication:
The security adapter is a plug-in to the authentication manager. The security adapter uses the credentials entered by a user (or supplied by an authentication service) to authenticate the user, as necessary, and allow the user access to the Siebel application. You can implement a security adapter other than one of those provided by Siebel Business Applications provided the adapter you implement supports the Siebel Security Adapter Software Development Kit. For more information, see Security Adapter SDK. You can implement LDAP or ADSI authentication for application object manager components and for EAI components. Do not use the ADSI security adapter or LDAP security adapter to authenticate access to batch components such as, for example, the Communications Outbound Manager. Configure batch components to use the database security adapter instead. Batch components access the Siebel database directly and, as a result, must use the database security adapter. Note also that Siebel Server infrastructure and system management components such as Server Manager, Server Request Broker, and Server Request Processor access the Siebel database directly. For this reason, these components cannot use the LDAP or ADSI security adapter. Authentication DirectoriesAn LDAP directory or an Active Directory is a store in which information that is required to allow users to connect to the Siebel database, such as database accounts or Siebel user IDs, is maintained external to the Siebel database, and is retrieved by the security adapter. For specific information about third-party directory servers supported by the security adapters provided with Siebel Business Applications, see Directory Servers Supported by Siebel Business Applications and Siebel System Requirements and Supported Platforms on Oracle Technology Network. NOTE: For Siebel CRM product releases 8.1.1.9 and later and for 8.2.2.2 and later, the system requirements and supported platform certifications are available from the Certification tab on My Oracle Support. For information about the Certification application, see article 1492194.1 (Article ID) on My Oracle Support. Security Adapter AuthenticationIn general, the process of security adapter authentication includes the following principal stages:
Depending on how you configure your authentication architecture, the security adapter might function in one of the following modes, with respect to authentication:
For information on the most commonly reported error messages when implementing standard Siebel security adapters, see 477528.1 (Article ID) on My Oracle Support. Event Logging for Siebel Security AdaptersSiebel Business Applications provide the following event types to set log levels for security adapters: Modify the values for these two event types to set the log levels that the Application Object Manager writes to the log file. For more information about how to set the log levels for event types, see Siebel System Monitoring and Diagnostics Guide. |
Siebel Security Guide | Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Legal Notices. | |