Bookshelf Home | Contents | Index | PDF | ![]() ![]() |
Siebel Security Hardening Guide > Securing the Network and Infrastructure > Securing the Siebel ClientThe following general guidelines are applicable for securing all client computers that access Siebel Business Applications. For specific information on security recommendations for mobile clients, see Securing Mobile Clients. Deploying Siebel Open UIYou can optionally deploy Siebel Business Applications using the Siebel Open UI. Siebel Open UI is the most secure Siebel CRM client available and is therefore recommended if your Siebel implementation has high-security requirements. Siebel Open UI has the following characteristics:
For additional information about Siebel Open UI, see Deploying Siebel Open UI and Configuring Siebel Open UI. Enabling ActiveX Controls for High Interactivity ClientsSiebel Business Applications in high-interactivity mode use ActiveX technology to deliver several features, for example, email client integration. A browser running a high-interactivity application must be enabled to access and use ActiveX controls. You can do one of the following:
If you are not using supported security-setting templates for applicable Web content zones for your Siebel Business Applications in high-interactivity mode, then to enable full functionality related to ActiveX controls you must manually enable the Internet Explorer ActiveX settings. For information on this task, see the chapter on configuring the browser for Siebel Web clients in Siebel System Administration Guide. Encrypting Communications for Web ClientsIt is recommended that you secure all communications between the Siebel Web Client and the Web server using either TLS or SSL, if support for these protocols is provided by your Web server. Encryption is not set by default. For additional information, see Enabling Encryption Between the Web Client Browser and Web Server. Providing Physical Security for the Client DeviceThe physical security of the client device is handled outside of Siebel Business Applications. You can use utilities that provide computer-level security by enforcing computer passwords or encrypting the computer hard drive. Most leading handheld devices have user-enabled passwords. It is recommended that you use a two-factor authentication approach (for example, RSA Secure ID) for network components; this is a security process that confirms user identities using something users have and something they know. Requiring two different forms of electronic identification reduces the risk of fraud and protects against password attacks. Defining a Policy for Unattended Personal Computer SessionsUsers should not leave workstations unattended while they are logged in to Siebel Business Applications; doing so makes their computer potentially accessible to unauthorized users. Define a corporate policy for handling unattended PC sessions. Oracle recommends using password-locked screen saver features on all PCs. Keeping Browser Software UpdatedUpdate browser software when new versions are released; new releases often include additional security features. If you are using Internet Explorer, then check the Microsoft Web site for the latest browser security patches. Certain features and functions in Siebel Business Applications work in conjunction with security or other settings on the Web browser. Some of the security features provided by supported browsers and operating systems are not supported when used with Siebel Business Applications. Detailed information about the browser settings used in deploying Siebel clients is provided in Siebel System Administration Guide. For more information about the settings in your Web browser, see the documentation that came with your browser. Updating Security PatchesTo protect against malicious software (malware), apply security patches provided by the desktop operating system provider on a regular basis. The same is true of patches released by antivirus software suppliers, and by companies that provide other third-party software products supported by Siebel Business Applications. |
![]() ![]() |
Siebel Security Hardening Guide | Copyright © 2014, Oracle and/or its affiliates. All rights reserved. Legal Notices. | |