Go to primary content
Siebel CRM Siebel Security Guide
Siebel Innovation Pack 2017, Rev. A
E24814-01
  Go to Documentation Home
Home
Go To Table Of Contents
Contents
Go To Index
Index

Previous
Previous
 
Next
Next
    View PDF

About User Authentication

Authentication is the process of verifying the identity of a user. Siebel Business Applications support multiple approaches for authenticating users. You choose either security adapter authentication or Web SSO authentication for your application users:

You can choose the approach for user authentication individually for each application in your environment, based on the specific application requirements. However, there are administrative benefits to using a consistent approach across all of your Siebel Business Applications, because a consistent approach lowers the overall complexity of the deployment.

Configuration parameter values determine how your authentication architecture components interact. For information about the purpose of configuration parameters, see Appendix A, "Configuration Parameters Related to Authentication". For information about the seed data related to authentication, user registration, and user access that is installed with Siebel Business Applications, see Appendix B, "Seed Data".

Issues for Developer and Mobile Web Clients

The following special issues apply for authentication for deployments using Siebel Developer Web Client or Mobile Web Client:

  • For a particular Siebel application, when users connect from the Siebel Developer Web Client to the server database, the authentication mechanism must be the same as that used for Siebel Web Client users. This mechanism could be database authentication or a supported external authentication strategy, such as LDAP.

  • When connecting to the local database from the Mobile Web Client, mobile users must use database authentication. For information about authentication options for local database synchronization, see Siebel Remote and Replication Manager Administration Guide.

Comparison of Authentication Strategies

Table 5-1 highlights the capabilities of each authentication method to help guide your decision. Several options are available for each basic strategy. Comparisons do not apply for Siebel Mobile Web Client, for which only database authentication is available.

Table 5-1 Functionality Supported in Different Authentication Methods

Functionality Database Security Adapter LDAP Security Adapter Web SSO

Requires additional infrastructure components.

No

Yes

Yes

Centralizes storage of user credentials and roles.

No

Yes

Yes

Limits number of database accounts on the application database.

No

Yes

Yes

Supports dynamic user registration. Users are created in real-time through self-registration or administrative views.

No

Yes

Siebel Business Applications do not support the feature, but it might be supported by third-party components.

For Web SSO, user registration is the responsibility of the third-party authentication architecture. It is not logically handled by the Siebel architecture.

Supports account policies. You can set policies such as password expiration, password syntax, and account lockout.

Only password expiration is supported and only on supported IBM DB2 RDBMS operating systems.

Yes

Siebel Business Applications do not support the feature, but it might be supported by third-party components.

For Web SSO, account policy enforcement is handled by the third-party infrastructure.

Supports Web Single Sign-On, the capability to log in once and access all the applications within a Web site or portal.

No

No

Yes


The Siebel LDAP security adapter supports the Internet Engineering Task Force (IETF) password policy draft (09) for handling password policy violations and error reporting. As a result, the LDAP security adapter returns meaningful error messages and takes appropriate actions when password policy violations occur, provided the adapter is used with directory servers that are compliant with the draft. For additional information on the IETF password policy draft, go the IETF Web site at

http://tools.ietf.org/html/draft-behera-ldap-password-policy-09