Go to primary content
Siebel CRM Siebel Security Guide
Siebel Innovation Pack 2017, Rev. A
E24814-01
  Go to Documentation Home
Home
Go To Table Of Contents
Contents

Previous
Previous
 
 

Index

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X 

Numbers

56-bit encryption, upgrading, 4.16.4

A

access control
access-group, about, 9.2.10
accessible data, suborganization view, 9.11
All access control, 9.2.9
business environment structure, about and elements (table), 9.3.1
business services, configuring, 9.17, 9.18
Catalog access control view, 9.11
catalogs, overview, 9.1.3
customer data, 9.1.2
defined, 9.1
divisions, setting up, 9.3.2
drilldown visibility, configuring, 9.21
license key, role of, 9.6
manager access control, 9.2.5, 9.11
master data, 9.1.2
organization, 9.2.6, 9.11
organizations, setting up, 9.3.3
party data model, S_PARTY table, 9.22
party types, about and table, 9.1.1
party types, relationship among, 9.22.1
personal, 9.11
personal access control, 9.2.1
pick applets, configuring visibility, 9.20
Pick List Object, setting visibility, 9.20.1
position, 9.2.2
positions, setting up, 9.3.4
record level, 2.5.3.2
responsibilities, configuring access to business services, 9.17, 9.18
responsibilities, defining and adding views and users, 9.3.5
responsibilities, role of, 5.12.7
single-position access control, about, 9.2.3
single-position access control, Manager view, 9.11
special frame class, using, 9.20.3
strategies, list of, 9.3
suborganization access control, 9.2.8
tab layouts, managing through responsibilities, 9.15
team, 9.11
team access control, about, 9.2.4
troubleshooting issues, 10.3
view level, 2.5.3.1
view properties, displaying, 9.11
view-level mechanisms, 9.1
visibility applet type, 9.11
Visibility Auto All property, using, 9.20.2
access control, business component view
manager setting, 9.2.5.2
role of, 9.5
single or multiple organization, 9.2.7
single-position view mode, 9.2.3
suborganization setting, 9.2.8
team setting, 9.2.4
access control, implementing
applet access control properties, 9.10
application, role of, 9.5
application-level access control, 9.6
business component view modes, 9.8
Owner party type, 9.8
responsibilities, about, 9.5
responsibilities, associating with users, 9.7
view access control properties, 9.11
view construction example, 9.12
visibility applet, role of, 9.5
visibility properties, role of, 9.5
Access Group base and extension tables, illustration, 9.22.12
Access group data model, about and diagram, 9.22.12
access groups
catalog access control, 9.2.10
categories, associating with, 9.14.4.2
categories, disassociating with, 9.14.4.2
creating, 9.14.3.1
data, associating with, 9.14.4
disassociating from catalog, 9.14.4.1
hierarchy, modifying, 9.14.3.3
master data catalog, associating with, 9.14.4.1
members, adding, 9.14.3.2
access, restricting
database server, C.5.1
network, C.3.2
Siebel application, C.6.7
Siebel File System, C.4.2
access-group access control
about, 9.2.10
administrative tasks, listed, 9.14
basic principles, 9.13
business scenario, 9.13.1
inheritance rules, 9.13, 9.13
user’s experience, 9.13.3
Account base and extension tables, illustration, 9.22.6
Account data model, 9.22.6
account policies, about implementing, 7.5
Active Session Timeout Value parameter, 6.7.1, A.6.1, A.6.2
ActiveX controls, enabling, C.3.7.2, C.3.7.2
adapter-defined user name
deployment option, 5.12
implementing, 5.12.5
Admin mode, visibility, 9.2.9, 9.11
Administration - Server Configuration screen, unable to work in, 10.1
administrative tasks, deactivating employees, 8.10.1.2
administrative tasks, organizational
company structure, setting up, 9.3.1
divisions, setting up, 9.4.1
organizations, setting up, 9.4.2
administrative tasks, positions and responsibilities
positions, setting up, 9.4.3
responsibilities, defining, 9.4.4
All access control
about, 9.2.9, 9.11
mobile user restriction, 9.7.2
AllowAnonUsers parameter
setting for LDAP, 5.6.7.2, 5.6.8.1, 5.6.8.1
anonymous browsing
about, 8.2
anonymous user, role of, 8.3.1
configuration parameters, setting, 8.3.2
implementing, 5.12.6.1, 8.3
views, setting or removing explicit login, 8.3.3
anonymous user
about, 5.6.4, 8.2
anonymous user record, modifying, 8.3.1
automatically populated fields, 8.6.1
implementing, 5.12.6
seed data responsibilities, about using, 8.3.1
seed data user IDs, 8.6.1
self-registration, modifying for, 8.6.1
Anonymous User Name parameter
anonymous browsing, setting for, 8.3.3
setting for LDAP, 5.6.6
Anonymous User Password parameter
about, A.6.1
setting for LDAP, 5.6.6
applets
access control, 9.11
defined, 9.10
display name and visibility, 9.10
pick applet visibility, 9.20
special frame class for visibility, 9.20.3
viewing properties, 9.10
visibility properties, about, 9.10
application
access control, implications of, 9.5
license key and view visibility, 9.6
Application Password parameter
about, A.3
reencrypting, 4.18
setting for LDAP, 5.6.7.3
application user
about, 5.6.4
write privileges, 8.9, 8.11.1
Application User DN parameter
about, A.3
setting for LDAP, 5.6.7.3
application-level access control, about and view visibility, 9.6
APPUSER, 5.6.4
APPUSERPW, 5.6.4
architecture, Siebel Security
data confidentiality, end-to-end encryption, 2.5.2
data continuity, auditing for, 2.5.4
data encryption, C.3.4
data visibility, authorization to control, 2.5.3
intrusion, preventing by secure physical deployment, 2.5.5
mobile solutions, security for, 2.5.6
recommended topologies, C.3.2
secure system access, user authentication for, 2.5.1
attributes, password storage, 5.5.5.1
auditing, 2.5.4
auditing Siebel Business Applications, C.7.4
authentication
architecture differences between Standard and Developer Web Clients, 5.13
database authentication, 5.3
database authentication, implementing, 5.4
methods, comparison table, 5.1.2
methods, overview, 5.1
networks, C.3.3
Siebel application users, C.6.4, C.6.4
Authentication Method parameter, 5.8.2
authentication options
adapter-defined user name, implementing, 5.12.5
anonymous browsing, implementing, 5.12.6.1
anonymous user, implementing, 5.12.6
checksum validation, 5.12.2
credentials password hashing, 5.14
implementing, 5.12.3
password hashing, 5.14
remote configuration, 5.13.2
roles, 5.12.7
secure login, 7.2
shared database account, implementing, 5.12.4
authentication process
federated SSO, for interactive UIs, 6.11
auto-login cookie, 7.6

B

Base Distinguished Name parameter
about, A.3
setting for LDAP, 5.6.7.3
business component view mode
about data access, 9.8
manager setting, 9.2.5.2
mode and visibility fields, viewing, 9.8
role in access control, 9.5
single or multiple organization setting, 9.2.7
single-position setting, 9.2.3
suborganization setting, 9.2.8
team setting, 9.2.4
business components
All access control, 9.2.9
control properties, displaying, 9.11
overriding visibility, 9.20.1
self-registration, 8.6.1
self-registration views, 8.6.4
view construction example, 9.12
visibility applet, about, 9.11
visibility applet, role in access control, 9.5
visibility properties, role in access control, 9.5
business environment structure
about and elements (table), 9.3.1
multiple organizations, benefits of, 9.3.1.1
multiple organizations, reasons for, 9.3.1.2
business services
configuring access control, 9.17, 9.18
creating custom, 8.6.4.3

C

Cascade button, 9.13
Catalog access control view, 9.11
catalogs
about, 9.1.3
about accessing, 9.1.3
access control strategy, 9.3
access control, types of, 9.2.10
access groups, associating with data, 9.14.4
access-group access control principles, 9.13
administrative tasks, listed, 9.14.1
associating access group and data, 9.14.4.1
categories, role of, 9.1.3
controlling access to categories, 9.13
disassociating access groups, 9.14.4.1
granting access to, 9.2.10
navigating, 9.13.3
properties of, 9.1.3
role in master data, 9.1.3
user experience, about, 9.13.3
categories
access groups, associating with, 9.14.4.2
access groups, associating with data, 9.14.4
access groups, disassociating with, 9.14.4.2
administration tasks, listed, 9.14.1
company structure, described, 9.3.1
controlling access to, 9.13
inheritance rules, 9.13, 9.13
relation to catalog, 9.1.3
categorized data
about user experience, 9.13.3
viewing in Info Center, 9.13.3
certificate
keystore and truststore files, about, 4.1.1.4
keystore and truststore files, modifying, 4.1.1.5
requirements for communications, 4.1.1.1
Certificate Authority (CA) Certificate File Name parameter, 4.8.1
Certificate File Name parameter, 4.8.1
Change Position button, 8.12.3.1, 9.3.4.1
checksum utility
about, 5.12.2
validation, setting up, 5.12.2
client browsers
communication encryption, C.3.4.1
software updates, C.3.7.6
column, encrypted, 4.13
Common Criteria for Information Technology Security Evaluation, C.9.2
Common Vulnerability Scoring System, C.8.2
communications encryption, 4.1.1
certificate requirements, 4.1.1.1
keystore and truststore files, about, 4.1.1.4, 4.1.1.5
company structure
categories, described, 9.3.1
setting up, 9.3.1
components, disabling, C.6.3
configuration
activating changes in application configuration, A.7
application configuration parameters, A.7
application interface profile, A.6
application interface profile, authentication parameters, A.6.1
application interface profile, object manager parameters, A.6.3
application interface profile, REST inbound authentication parameters, A.6.5
application interface profile, SWE parameters, A.6.4
Application User DN parameter, A.3
Base Distinguished Name parameter, A.3
Credentials Attribute parameter, A.3
enterprise profile, A.4
eservice.cfg sample, 5.12.7
optional parameters, A.6.2
parameter values, usage guidelines, 5.6.8.1
Password Attribute Type parameter, A.3
relating to client, A.7
remote configuration guidelines, 5.13.2
Roles Attribute (optional) parameter, A.3
roles, setting, 5.12.7
security profile, A.2
server parameters for Siebel Gateway, A.1
server profile, A.5
Shared Database Account DN parameter, A.3
Siebel Username Attribute parameter, A.3
SsIDatabase parameter, A.3
Trust Token parameter, A.3
User Name Attribute Type parameter, A.3
UseRemoteConfig parameter, A.7
Configure Web Single Sign-On parameter
for Application Interface, A.6.1
for Security Profile, A.3
configuring access control, 9.16
contact users
adding new, 8.10.3
existing contacts, promoting from, 8.10.4
organizational association, 9.2.6
cookies
auto-login credential, 7.6
enabling, 7.6.3
persistent, 7.6
corporate network security, overview, 2
credentials
authentication against directory, 5.5.1
role in LDAP authentication, 5.2.2
security adapter authentication process, 5.5.1
Credentials Attribute parameter
about, A.3
setting for LDAP, 5.6.7.3
credentials password hashing, 5.14
Critical Patch Updates, C.2.2.2
CSSSWEFrameListVisibilityAssoc class, 9.20.3
CSSSWEFrameListVisibilityPick class, 9.20.3
CSSSWEFrameUserRegistration class, 8.6.4.4, 8.6.4.7
customer data, role in access control, 9.1.2

D

data confidentiality, end-to-end encryption, 2.5.2, C.3.4
data continuity, auditing, degrees of, 2.5.4
data encryption, 4.1.2
Data Vault, C.5.3
data visibility, authorization to control
about, 2.5.3
access control, record level, 2.5.3.2
access control, view level, 2.5.3.1
intrusion, preventing by secure physical deployment, 2.5.5
data, categorized, 9.13.3, 9.13.3, 9.13.3
database authentication
about, 2.5.1.1
compared to other methods, 5.1.2
delegated administration, availability of, 8.11.1
implementing, 5.4
limitations of, 5.3.2
overview, 5.3
password hashing, 5.14
process overview, 5.3.1
self-registration, 8.4
database column, encrypted, 4.13, 4.14
database server access, C.5.1
database storage, data confidentiality, 2.5.2, C.5.3
DBO password, changing, 3.5
deduplication
about, 8.6.5
deduplication check, disabling, 8.6.5.3
fields, modifying, 8.6.5.2
Default Organization Division records, seed data, B.2.4
defined special users, B.2.1
delegated administration
authentication requirements, 8.11.1
delegated administrator responsibility, restricting, 9.7.1
new customers, registering, 8.11.3
partner applications, about, 8.11.4
partner user, registering, 8.11.4
registering users, about, 8.11.3
responsibilities, assigning, 8.11.4
write privileges, user directory, 8.11.1
delegated administrators
about, 8.11
delegated administration, administrator access, 8.11.2
inheritance of responsibilities, 8.10.5
New Responsibility field, editing, 8.10.5
user authentication requirements, 8.11.1
deleting positions, 9.3.4.2
denial of service attacks, preventing, C.3.1.12
deployment guidelines, C.6.2
deployment options, LDAP adapters, 5.12
Developer Web Client
See Siebel Developer Web Client
directory
checking credentials against, 5.5.1
directory records, about, 5.6.4
permissions record parameter, A.3
requirements, 5.5.5
role of, 5.2.1
shared database account deployment option, 5.12
user records, adding, 5.6.5
user, creating, 5.6.4
divisions
base and extension tables, illustration, 9.22.7
division records, deleting, 9.3.2
Organization party type, in, 9.22.1
relation to organization, 9.22.8
role of, 9.3.2
setting up (procedure), 9.4.1
DoCompression parameter, C.3.1.3
documentation security references, bibliography, 2.6
drilldown visibility, configuring, 9.21
duplicate users
deduplication fields, modifying, 8.6.5.2
self-registration deduplication check, disabling, 8.6.5.3

E

Email communications
deleting processed email, C.3.12.3
encrypting between email servers and Siebel Servers, C.3.12.2
securing, C.3.12
Employee base and extension tables, illustration, 9.22.4
employee user
active position, changing, 8.12.3.1
contact user, adding new, 8.10.3
defined, 9.22.4
Employee data model, 9.22.4
employee setup, about completing, 8.10.1.1
employee, deactivating, 8.10.1.2
minimum requirements, 8.10.1
new record, adding, 8.10.1
New Responsibility field, population of, 8.10.5
partner user, adding, 8.10.2
position access control, 9.2.2
position, active, 8.12.3
primary position, changing, 8.12.3.2
responsibilities, assigning, 9.7.4
seed data record, B.1
employees, deactivating, 8.10.1.2
Enable Peer Authentication parameter, 4.8.1
Encrypt client Db password parameter, 5.15.1
encryption
AES encryption administration, 4.12
Application Interface profile, C.3.5.5
client browser and Web server, C.3.4.1
communications encryption, 4.1.1
configuring for Siebel components, 4.6
data encryption, 4.1.2
database data, C.5.3
enabling on database table column, 4.13
end-to-end for data confidentiality, 2.5.2, C.3.4
jndi.properties file, C.3.6.2.1
Key Database Manager, using, 4.15
Mobile Web client, encryption for synchronization, 4.11
network traffic, C.3.4
new encryption keys, adding, 4.15.1
search encrypted data, 4.13
Siebel Application Interface, configuring for TLS encryption, 4.9
Siebel Server for TLS encryption, configuring for, 4.8
TLS encryption, configuring Siebel Enterprise or Siebel Server, 4.8, 4.9
types of, 4.1
Unicode support, 4.19
upgrade issues for data encryption, 4.12.4
Web client, configuring for, 4.10
encryption administration
about, 4.12
Key Database Manager, using, 4.15
upgrading, 4.12.4
encryption upgrade
input file, modifying, 4.16.2
prerequisites, 4.16.1
utility, running, 4.16.4
Encryption Upgrade Utility
56-bit encryption upgrading, 4.16.4
modifying the input file, 4.16.2
prerequisites to upgrade to higher encryption level, 4.16.1
eservice.cfg file, LDAP sample, 5.12.7
exporting tab layouts, 9.15.3
external authentication
anonymous user record, 8.2
Developer Web Clients, including, 5.13
login credentials, 8.1
remote configuration option, about, 5.13
remote security configuration requirements, 5.13.2
security adapters for, 2.5.1.2
system testing, 5.6.10

F

Federal Information Processing Standard (FIPS) 140, C.9.3
Federated SSO authentication
about, 6.10
for interactive user interfaces, 6.11
identity-provider initiated, 6.12
fields, self-registration
designating as required, 8.6.4.4
locating, 8.6.4.4
required property, removing, 8.6.4.4
files, cookies, 7.6
files, protecting, C.4.1
FindContact method
Forgot Your Password, modifying, 8.8.4
input fields, adding or deleting, 8.8.8
firewalls
deploying, C.3.1
large Siebel CRM deployment, C.3.2.2
medium Siebel CRM deployment, C.3.2.1
Forgot Your Password? question
architecture, 8.8.3
comparison fields, modifying, 8.8.6, 8.8.7
input fields, adding or deleting, 8.8.8
new password, retrieving, 8.8.1
null fields, processing of, 8.8.5
Query User step parameters, 8.8.4
using link, about, 8.8
workflow process, about modifying, 8.8.4
frame class, 9.20.3

G

gateway
authentication, 5.7
security profile, about, 5.7.2
general security recommendations, C.2.2
Group Access control view, 9.11
GUESTCP user ID, 3.2.2, B.2.2
GUESTCST user ID, 3.2.2, B.2.2
GUESTPW, 5.6.4
guidelines for deployment, C.6.2

H

hashing passwords, 5.14
Host Name parameter, A.3
Household
administrative tasks, 9.14.2.3
base and extension tables, illustration, 9.22.10
HTTP 1.1 protocol, C.3.1.3

I

importing tab layouts, 9.15.3
industry standards, using, 2.3
Info Center
categorized data, viewing, 9.13.3
Explorer, about, 9.13.3
IntegratedSecurity parameter, 5.13
internal administrator, modifying New Responsibility field, 8.10.5
Internet Assigned Numbers Authority, Private Enterprise Number, 5.5.5.1
Internet Protocol Security (IPsec), C.3.1.11, C.3.1.11

J

jndi.properties file, encrypting, C.3.6.2.1

K

Key Database Manager
keyfile password, changing, 4.15.2
new encryption keys, adding, 4.15.1
running, 4.15
keyfile password, changing, 4.15.2
keystore and truststore files, about, 4.1.1.4
keystore and truststore files, modifying, 4.1.1.5

L

LDAP adapter
about, 5.6
Application Password parameter, A.3
configuration parameter values, 5.6.6
configuration parameters, usage guidelines, 5.6.8.1
delegated administrator, availability of, 8.11.1
deployment options, 5.12, 5.12
directory records, about, 5.6.4
installation prerequisites, 5.6.1
restarting servers, 5.6.9
security adapter authentication, 5.5.1, 5.6
security adapter process overview, 5.2.2
SsIDatabase parameter, A.3
testing, 5.6.10
user records, adding, 5.6.5, 5.6.5
users, creating, 5.6.4
LDAP client software
installing, 5.9
LDAP, security adapter authentication, 5.5.1
license agreement, replacing default text, 8.6.4.1
license key, role in view visibility, 9.6
load balancers, about, C.3.1.6
Local Access flag, 9.7.2
login
account policies, about implementing, 7.5
database authentication overview, 5.3
password, storage of, 5.5.5.1
requirements for views, setting or removing, 8.3.3
login form
password expiration, about and implementing, 7.5.1
Login Session (guest) Timeout Value parameter, A.6.1

M

Mainwin
See mwcontrol utility
manager access control, about, 9.2.5
Manager List Mode user property, 9.2.5.1
Manager visibility, 9.2.5, 9.11
manager-subordinate relationship, about, 9.2.5
master data
access control, 9.2.10, 9.3
associating with access group, 9.14.4.1
organization of, 9.1.3
role in access control, 9.1.2
merging positions, 9.3.4.2
message broadcasting, C.6.10
Microsoft Windows, changing SADMIN password, 3.3
mobile applications
device user authentication, 2.5.6.1
security, about, 2.5.6
mobile physical device security, C.3.10
mobile users
accessible views, 9.7.2
authentication, restriction, 5.1.1
positions and visibility rules, 9.3.4.2
Mobile Web client, encryption for synchronization, 4.11
multiple organizations
access control, 9.2.7
benefits of, 9.3.1.1
reasons for, 9.3.1.2
mwcontrol utility, 4.4.3

N

Network Address Translation, implementing, C.3.1.5, C.3.1.11
network and infrastructure security recommendations, C.3
network security
about, C.3.1
authentication, C.3.3
encrypt network traffic, C.3.4
firewalls, C.3.1
IPsec, C.3.1.11, C.3.1.11
load balancers, C.3.1.6
Network Address Translation, C.3.1.5, C.3.1.11
proxy servers, C.3.1.7
recommended topologies, C.3.2
routers, C.3.1.4
Virtual Private Networks (VPNs), C.3.1.10
network topologies, recommended
about, C.3.2, C.3.2
large deployments, C.3.2.2
medium deployments, C.3.2.1
New Responsibility field
about, 8.6.1
modifying, 8.10.5, 8.10.5
population of, 8.10.5
null fields, processing of, 8.8.5

O

Open UI, about, 2.9
operating systems
about, C.4
applying patches and updates, C.4.4
protecting files, C.4.1
protecting resources, C.4.1
required tasks, C.4
securing, C.4, C.7
Oracle LDAP Client
installing, 5.9
installing on UNIX, 5.9.3
installing on Windows, 5.9.2
Oracle Software Security Assurance program, C.2.4
Oracle Wallet Manager
creating a wallet, 5.9.5
organization access control
about, 9.2.6
active organization and view access, 9.7.1
associating responsibilities, 9.7.1
customizable product visibility, 9.2.7
multiple organization access, identifying views with, 9.2.7
multiple-organization access control, 9.2.7
single and multiple organizations, 9.2.7
single-organization access control, 9.2.7
suborganization access control, 9.2.8
Organization base and extension tables, illustration, 9.22.8
Organization data model, about, 9.22.8
Organization group type, administrative tasks, 9.14.2.2
Organization party type
defined, 9.22.8
divisions, about, 9.22.1
relationship rules, 9.22.1
Organizational visibility, 9.11
organizations
administrative tasks, 9.14.2.2
benefits of, 9.3.1.1
divisions, role of, 9.3.2
multiple organizations, reasons for, 9.3.1.2
positions, changing, 9.3.4.1
setting up (procedure), 9.4.2
setting up, about, 9.3.3
Owner party type, 9.8
Owner Type Position view mode, 9.11

P

parameter settings
troubleshooting issues, 10.4
parties
See party types
partner applications
delegated administrators, role of, 8.11.4
duplication fields, 8.6.5.2
primary position, changing, 8.12.3.2
responsibilities, assigning, 8.11.4, 9.7.4
self registration, 8.5, 8.6.1
self-registration workflow views, 8.6.3.2
Partner Organization base and extension tables, illustration, 9.22.9
Partner Organization data model, 9.22.9
partner user
adding, 8.10.2
new user, registering, 8.11.4
position access control, 9.2.2
responsibilities, assigning, 8.11.4, 9.7.4
Party base and extension tables, about and diagram, 9.22
Party data model
about, 9.22
Access group data model, 9.22.12
Account data model, 9.22.6
Division data model, 9.22.7
Employee data model, 9.22.4
Household data model, 9.22.10
Organization data model, 9.22.8
Partner Organization data model, 9.22.9
Person (contact) data model, 9.22.2
Position data model, 9.22.5
User data model, 9.22.3
User list data model, 9.22.11
party types
about and table, 9.1.1
access control, categorized master data, 9.2.10
determining user access, 9.8
parties, defined, 9.1.1
relationships among party types, 9.22.1
user lists, adding users, 9.14.2.4
user lists, creating, 9.14.2.4
password
changing default passwords, 3.2
enabling fields for end user to change password, 3.2
expiration, about and implementing, 7.5.1
failed tasks, checking for, 3.6
Forgot Your Password architecture, 8.8.3
Forgot Your Password link, 8.8
hashing, 5.14
retrieving a new password, 8.8.1
SADMIN, changing on Windows, 3.3
Table Owner (DBO) and password, changing, 3.5
user profile, changing for, 8.12.2
Password Attribute Type parameter
about, A.3
setting for LDAP, 5.6.7.3
passwords
hashing, C.6.5.3
management policies, C.6.4
Siebel application policies, C.6.5.1
Siebel service owner, C.4.3
syntax rules, C.6.5.2
patches, management, C.2.2.1
PCI Data Security Standard (DSS)
about, C.9.1
Siebel support for, C.9.1
permissions, authentication directory parameter, A.3
persistent cookie, 7.6
Person base and extension tables, illustration, 9.22.3
Person data type
contrasted with User, 9.22.3
responsibilities, assigning, 9.7.4
personal access control, 9.2.1, 9.11
Personal visibility, 9.2.1
physical security of client computers, C.3.7.4
pick applets
special frame class, using for visibility, 9.20.3
visibility, 9.20
Pick List object, setting visibility, 9.20.1
Popup Visibility Type property, 9.20
port allocations for Siebel CRM, C.10.1
Port parameter, setting for LDAP, 5.6.7.3
position access control, about implementing, 9.2.2
Position base and extension tables, illustration, 9.22.5
positions
active position, about, 8.12.3
active position, changing, 8.12.3.1
active position, designating, 9.2.2
administrative tasks, listed, 9.14.2.1
changing within organization, 9.3.4.1
contact users, adding new, 8.10.3
deleting and merging, 9.3.4.2
multiple employees, about, 9.3.4.1
parent-and-child relationships, 9.3.4.2
partner users and delegated administrators, 8.11.4
Position data model, 9.22.5
position hierarchy, 9.2.5
position, defined, 9.2.2
primary position, 9.2.2
primary position, changing, 8.12.3.2
renaming, cautions about, 9.3.4.2
role in employee definition, 9.22.4
setting up (procedure), 9.4.3
setting up, about, 9.3.4
primary responsibility, assigning, 9.15.2
Private Enterprise Number, 5.5.5.1
Private Key File Name parameter, 4.8.1
Private Key File Password parameter, 4.8.1
processed email, deleting, C.3.12.3
profiles
application interface profile parameters, A.6
application interface, authentication parameters, A.6.1
application interface, object manager parameters, A.6.3
application interface, REST inbound authentication parameters, A.6.5
application interface, SWE parameters, A.6.4
enterprise profile parameters, A.4
security profile parameters, A.2, A.3
server profile parameters, A.5
proxy employee
about, 9.2.6
seed data positions, B.2.4
proxy servers, about, C.3.1.7
PROXYE user ID, B.1

Q

Query User parameters, 8.8.4

R

referential data, access control strategy, 9.3
registration, troubleshooting user registration issues, 10.2
remote authentication, 5.8
remote configuration option
applicable authentication strategies, 5.13.2
external authentication, about implementing, 5.13
implementation guidelines, 5.13.2
reports, security, C.3.13
resources (security references), bibliography of, 2.6
responsibilities
about, 9.3.5
access control, implications of, 9.5
Administrative views, 9.3.5
anonymous user, 8.3.1
assigned by delegated administrator, 8.11.3
assigning, 5.12.7
assigning to employee user, 9.7.4
assigning to Partner, 9.7.4
assigning to Person, 9.7.4
associating with partner organizations, 8.11.4
configuring access to business services, 9.17, 9.18
configuring access to tasks, 9.16
defined, 9.7
defining, 9.4.4
inheritance of, 8.10.5
New Responsibility field, 8.10.5
organizations, associating with, 9.7.1
relation to job function, 9.3.5
responsibility fields and self-registration, 8.6.1
role of, 5.12.7
seed data, about and table, B.3
seed data, modifying, 8.3.1
seed responsibilities, modifying or deleting, 9.3.5
System Preferences view, limiting access, 9.3.5
user, assigning to, 9.7.4
using roles to associate, 5.5.5.1, 5.12.7
views, accessing locally, 9.7.2
views, seeing included in responsibility, B.3.2
roles
applicable authentication strategies, 5.12.7
assigning, 5.12.7
configuration setting, 5.12.7
storing in directory, 5.5.5.1, 5.12.7
Roles Attribute (optional) parameter
about, A.3
sample setting, eservice.cfg, 5.12.7
routers, C.3.1.4
RSA encryption
about, 2.3
about key exchange for, 4.7
r-services on UNIX, about, C.3.6.2

S

S_BU table, 9.22.8, 9.22.9
S_CONTACT table, 9.22.2, 9.22.2, 9.22.3, 9.22.4
S_EMP_PER table, 9.22.4
S_ORG_EXT table, 9.22.6, 9.22.8
S_ORG_GROUP table, 9.22.10
S_ORG_PRTNR table, 9.22.9
S_PARTY table
about and diagram, 9.22
Access Group data model, 9.22.12
Account data model, 9.22.6
Division data model, 9.22.7
Employee data model, 9.22.4
Household data model, 9.22.10
Organization data model, 9.22.8
Partner Organization data model, 9.22.9
Person (contact) data model, 9.22.2
Position data model, 9.22.5
User data model, 9.22.3
User list data model, 9.22.11
S_PARTY_GROUP table, 9.22.12
S_PARTY_PER table, 9.22.1
S_PARTY_REL table, 9.22.1
S_PER_RESP intersection table, 9.22.3
S_POSTN table, 9.22.4, 9.22.5
S_USER table, 9.22.3, 9.22.4
S_USERLIST table, 9.22.11
SADMIN password
default, 3.2.1
Microsoft Windows, changing on, 3.3
salt user password
about, 5.14, A.3
SecAdptDllName parameter
setting for LDAP, 5.6.7.3
SecThickClientExtAuthent system preference, 5.6.8.2
secure adapter communications deployment option, 5.12
secure coding practices, C.2.4
secure login
deployment option, 7.2
implementing, 7.2
Secure Sockets Layer, using with Siebel CRM, 2.7, C.2.5
security
architecture, components of, 2.5
industry standards, using, 2.3
overview, 2
resources, C.2.1
standards, C.2.3
threats, C.2.1
security adapter
administrator login requirement, 8.9
deployment options, listed, 5.12
directory requirements, 5.5.5
external security adapters, about implementing, 5.2
LDAP security adapter authentication, 5.5.1
LDAP security adapter authentication, implementing, 5.6
operation modes, 5.2.2
overview, 5.2
Shared Database Account DN parameter, A.3
Siebel Developer Web Client, and, 5.13
single application access, 5.5
security adapter authentication
adapter-defined user name, implementing, 5.12.5
administration through Web Client, 8.6.2
anonymous browsing, implementing, 5.12.6.1
anonymous user, implementing, 5.12.6
as authentication service, 5.5.1
benefits, 5.5
checksum validation, 5.12.2
compared to other methods, 5.1.2
credentials password hashing, 5.14
implementing, 5.12.3
login password storage, 5.5.5.1
password hashing, 5.14
remote configuration option, about, 5.13.2
roles, use of, 5.12.7
set-up, process overview, 5.6
shared database account, implementing, 5.12.4
security assessments
about, C.8.1
Common Vulnerability Scoring System, C.8.2
Security Encryption Level or Type parameter, 4.6
security recommendations, C.2.2
security references, bibliography of, 2.6
security roadmap, list of tasks, 2.10
security system access, user authentication for
about, 2.5.1
database authentication, 2.5.1.1
external authentication, security adapters for, 2.5.1.2
Web Single Sign-On (SSO), 2.5.1.3
security Web sites, C.2.1
seed data
anonymous user, about, 5.6.5
anonymous user, using, 8.3.1
Default Organization Division records, about, B.2.4
Employee record, B.1
GUESTCST user, 8.3.1
non-employee User records (table), B.2.2
position hierarchy, 9.2.5
proxy employee, B.1
Proxy Employee Position, about, B.2.4
responsibilities seed data chart (table), B.3
responsibilities, modifying, 8.3.1
self-registration workflow processes, revising, 8.6.4.2
Siebel Financial Service, about seed responsibilities and table, B.3.1
Siebel Financial Service, about seed users and table, B.2.3
user IDs, anonymous users, 8.6.1
workflow processes, about modifying, 8.6.4
self-registration
about, 8.4
activating (procedure), 8.6.3
anonymous user record, modifying, 8.6.1
application-specific examples, 8.5
business components, 8.6.1
components of self-registration, 8.6
configuration parameter, 8.6.2
custom business services, about, 8.6.4.3
deduplication check, disabling, 8.6.5.3
fields, redefining required fields, 8.6.4.4
license agreement, replacing default, 8.6.4.1
registering, user perspective, 8.5
user deduplication, about, 8.6.5
views, about modifying, 8.6.4
workflow processes, activating, 8.6.3.1
workflow processes, viewing, 8.6.3
self-registration fields
adding fields to a view, 8.6.4.5
automatic population, 8.6.1
class specification, 8.6.4.4
data collection process overview, 8.6.4.5
deduplication fields, modifying, 8.6.5.2
duplicate user updates, preventing, 8.6.5.1
required property, removing, 8.6.4.4
required, designating as, 8.6.4.4
virtual fields, use of, 8.6.4
self-registration workflow processes
data collection overview, 8.6.4.5
deduplication checks, disabling, 8.6.5.3
deduplication fields, modifying, 8.6.5.2
duplicate user updates, preventing, 8.6.5.1
fields, adding to views, 8.6.4.5
new applets, including, 8.6.4.7
seed data, revising, 8.6.4.2
views, table of, 8.6.3.2
Server Name parameter
setting for LDAP, 5.6.7.3
session cookies
about, 4.10.1
modes on the Application Interface, 7.6
shared database account deployment option, 5.12
Shared Database Account DN parameter
about, A.3
setting for LDAP, 5.6.7.3
shared database account, implementing, 5.12.4
Siebel application configuration, A.7
Siebel Application Interface
TLS encryption, configuring, 4.9
Siebel Business Applications
about, C.6.1
implementing access control, C.6.7
implementing user authentication, C.6.4
reports, C.3.13
securing, C.6
set-up requirements, C.6.2
Siebel service owner account, C.4.3
special users, B.2.1, C.6.6
testing, C.8
user authentication, C.6.4
Siebel clients
browser software, C.3.7.6
enabling ActiveX controls, C.3.7.2
encrypting communications, C.3.4.1
physical security, C.3.7.4
securing, C.3.7
security patches, C.3.7.7
Siebel components, disabling, C.6.3
Siebel database
about, C.5
auditing, C.7.2
backups, C.5.4
contact user, adding new, 8.10.3
employee setup, about completing, 8.10.1.1
employee, deactivating, 8.10.1.2
encrypting communications, C.3.4.3
new employee, adding, 8.10.1
New Responsibility field, population of, 8.10.5
partner user, adding, 8.10.2
position, role of, 8.10
protecting sensitive data in, C.5.3
restricting access, C.5.1
reviewing authorization policies, C.5.2
securing, C.5
user passwords, C.6.5.3
user records, adding, 5.6.5
Siebel Developer Web Client
compared to Standard Web Client, 5.13
configuration, A.7
security adapter system preference, 5.6.8.2
Siebel Document Server, securing, C.3.11
Siebel File System
excluding unsafe file types, C.4.2.4
restricting access, C.4.2
Siebel Financial Services
seed responsibilities, about and table, B.3.1
seed users, about and table, B.2.3
Siebel Gateway
custom security adapter authentication, A.3
database authentication, A.3
LDAP authentication, A.3
Siebel Gateway, server parameters, A.1
Siebel mobile clients
Siebel Mobile, C.3.10
Siebel Remote, C.3.9
Siebel Mobile, security, C.3.10
Siebel Open UI, about, 2.9, C.3.7.1
Siebel Remote
encrypt database data, C.3.9.7
password management policies, C.3.9.9
synchronization framework, C.3.9.1
Siebel Reports environment, securing, C.3.13
Siebel Security Adapter Software Developers Kit (SDK), about, 2.5.1.4
Siebel Server
configuration, A.7
data confidentiality to database, C.3.4.3
encrypting communications, C.3.4.2, C.3.4.3
restricting access, C.3.6.2
r-services, deleting, C.3.6.2
TLS, setting additional parameters on the gateway, 4.8.2
Siebel Username Attribute parameter, A.3
Siebel Web Client, administering security adapter authentication, 8.6.2
Siebel Web Engine, configuration parameters, A.6
Siebel Web server
directories, C.3.5.3
encrypt communications, C.3.5.4
seeded tomcat user, C.3.5.5
Siebel Web Server Extension
role in database authentication, 5.3.1
single application access, 5.5
single sign-on
implementing Federated SSO, 6.10
implementing Web SSO, 6.2
Oracle API Gateway role, 6.13
supported solutions for Siebel deployments, 6.1
single-organization access control, 9.2.7
single-position access control, 9.2.3, 9.11
special user privileges, B.2.1, C.6.6
spoofing attacks, protecting against, A.6.1
SsIDatabase parameter, about, A.3
SSL, about using with Siebel CRM, 2.7, C.2.5
SSO
implementing Federated SSO, 6.10
implementing Web SSO, 6.2
Oracle API Gateway role, 6.13
supported solutions for Siebel deployments, 6.1
Standard Encryptor, 4.19.3
Standard Web Client and Developer Web Client, compared, 5.13
standards
Common Criteria for Information Technology Security Evaluation, C.9.2, C.9.3
Payment Card Industry Data Security Standard, C.2.3, C.9.1
Personally Identifiable Information standard, C.2.3
suborganization access control
about, 9.2.8
accessible data, 9.11
system preferences, editing, 5.6.8.2

T

tab layouts
administering tab layout, 9.15.1
importing and exporting, 9.15.3
managing through responsibilities, about, 9.15
primary responsibility, assigning, 9.15.2
Table Owner (DBO), changing and password, 3.5
team access control, 9.2.4, 9.11
test user
about, 5.6.4
Siebel database, adding records for, 5.6.5
testing external authentication system, 5.6.10
testing system security, C.8.1
TESTPW, 5.6.4
TESTUSER, 5.6.4
TLS communication, about, 2.3
TLS encryption
configuring for, 4.8
Siebel Application Interface, configuring for, 4.9
Siebel Server, setting additional parameters on the gateway, 4.8.2
transaction data, access control strategies, 9.3
Transparent Data Encryption, C.5.3
transport layer security
supported versions, 2.8
using with Siebel CRM, 2.7
Transport Layer Security (TLS)
Email server and Siebel Server, C.3.12.2
Web client and Web server, C.3.4.1, C.3.4.1
Web server and Siebel Server, C.3.4.2
troubleshooting
access control issues, 10.3
Administration - Server Configuration screen, unable to work in, 10.1
parameter settings, 10.4
user registration issues, 10.2
Trust Token parameter, A.6.1

U

Unicode support, 4.19
UNIX, installing certificates, 4.4.2, 4.4.3
unregistered users
anonymous user record, 8.2
granting view access, 8.3
seed anonymous user, about, 8.3.1
views, setting or removing explicit login, 8.3.3
unsafe file types, excluding from Siebel File System, C.4.2.4
User
contrasted with Employee, 9.22.4
defined, 9.22.3
responsibilities, assigning, 9.7.4
User data model, 9.22.3
user administration
delegated administrators, 8.11
Siebel database, adding user to, 8.10
user profile, maintaining, 8.12
user authentication
See authentication
user authentication, about, C.6.4
User business component, underlying tables, 8.10
User data model, 9.22.3
user deduplication, about, 8.6.5
user directory
self-registration parameter, 8.6.2
write privileges, 8.9, 8.11.1
User List base and extension tables, illustration, 9.22.11
User list data model, about and diagram, 9.22.11
User lists
creating, 9.14.2.4
users, adding, 9.14.2.4
User Name Attribute Type parameter, A.3
setting for LDAP, 5.6.7.3
user privileges, special users, C.6.5.2
user profile
about updating, 8.12
active position, changing, 8.12.3
passwords, changing, 8.12.2
personal information, editing, 8.12.1
user records
adding to Siebel database, 5.6.5
data collection, process overview, 8.6.4.5
seed data, provides as (table), B.2.2
user registration
registering, about, 8.1
requirements, 8.1.1
seed data, 8.1.2
troubleshooting issues, 10.2
User Registration business component
comparison fields, modifying, 8.8.7
deduplication fields, excluding, 8.6.5.1
deduplication fields, modifying, 8.6.5.2
Forgot Your Password architecture, 8.8.3
new applets, 8.6.4.7
Query User step parameters, 8.8.4
self-registration views, 8.6.4
User Registration business service, 8.8.4
User specification source, about, 6.3.2
UseRemoteConfig parameter, 5.13.2, A.7
UserRemoteConfig parameter, A.7
users, Siebel database, adding to, 8.10

V

Validate Peer Certificate parameter, 4.8.1
view access, unregistered users, 8.3
views
adding fields, 8.6.4.5
displaying view properties, 9.11
explicit login requirements, setting or removing, 8.3.3
group access control, 9.11
license key and visibility, 9.6
limiting access to, 9.3.5
new applets, including, 8.6.4.7
responsibility, role in access, 9.7
self-registration views, related business components, 8.6.4
self-registration workflow views, table of, 8.6.3.2
view construction, example, 9.12
view, defined, 9.1
virtual fields, self-registration process, 8.6.4
Virtual Private Networks (VPNs), C.3.1.10
visibility
All, 9.11
Manager, 9.2.5
Personal, 9.2.1
positions, role of, 9.3.4
responsibilities, role of, 9.3.5
view visibility properties, 9.5
visibility applet
access control, types of, 9.11
business component and view connection, 9.5
field display, role in, 9.11
view construction example, 9.12
Visibility Applet Type property, 9.21.1
Visibility Auto All property, using, 9.20.2
Visibility Type property, 9.20.1, 9.21.2
vulnerabilities
denial of service attacks, C.3.1.12
description, C.2.1
scoring, C.8.2

W

wallet, creating, 5.9.5
Web applications, security, C.6.1
Web browser, security settings for, 2.5.7
Web Client users, authentication compatibility, 5.1.1
Web client, configuring encryption for, 4.10
Web servers
Application Interface profile, C.3.5.5
data confidentiality to Siebel Server, C.3.4.2, C.3.6.1
deleting subdirectories, C.3.5.3
encrypting communications, C.3.4.2
Web SSO
about, 2.5.1.3
anonymous browsing, implementing, 5.12.6.1
anonymous user, implementing, 5.12.6
checksum validation, 5.12.2
credentials password hashing, 5.14
implementing, 5.12.3
shared database account, implementing, 5.12.4
Web SSO adapter
adapter-defined user name, implementing, 5.12.5
Application User DN parameter, A.3
Base Distinguished Name parameter, A.3
Credentials Attribute parameter, A.3
deployment options, listed, 5.12
Password Attribute Type parameter, A.3
remote configuration option, about, 5.13.2
Roles Attribute (optional) parameter, A.3
roles, use of, 5.12.7
security adapter process overview, 5.2.2
SsIDatabase parameter, A.3
User Name Attribute Type parameter, A.3
Web SSO authentication
about, 6.2
authentication process, overview, 6.4
compared to other methods, 5.1.2
implementation considerations, 6.2.1
implementation, about, 6.3
remote authentication, 5.8
self-registration, 8.4
user specification source option, 6.3.2
Windows
SADMIN password, changing, 3.3
workflow processes
activating (procedure), 8.6.3
custom business services, about, 8.6.4.3
license agreement text, replacing, 8.6.4.1
revising, 8.6.4.2
seed data, revising, 8.6.4.2
seed processes, about modifying, 8.6.4
self-registration workflow views, table of, 8.6.3.2
self-registration, activating processes, 8.6.3.1
viewing, 8.6.3

X

X.500 Object ID, 5.5.5.1