Go to primary content
Siebel CRM Siebel Security Guide
Siebel Innovation Pack 2017, Rev. A
E24814-01
  Go to Documentation Home
Home
Go To Table Of Contents
Contents
Go To Index
Index

Previous
Previous
 
Next
Next
    View PDF

Process of Implementing LDAP Security Adapter Authentication

This topic describes the tasks involved in implementing LDAP security adapter authentication. Implement your authentication architecture in a development environment before deploying it in a production environment.

The process outlined in this topic provides instructions for implementing and testing security adapter authentication for a single Siebel application using an LDAP security adapter with one of the supported directory servers. The security adapter authenticates a user's credentials against the directory and retrieves login credentials from the directory. A user is authenticated by the user's Siebel user ID and a password.

You can repeat the appropriate tasks listed in this topic to provide security adapter authentication for additional Siebel Business Applications. You can also implement components and options that are not included in this process. For additional information about security adapter authentication options, see "Security Adapter Deployment Options". For information about special considerations in implementing user authentication, see "Troubleshooting User Authentication Issues".


Note:

If you use a security adapter that is not provided by Siebel Business Applications, then it must support the Siebel Security Adapter Software Developers Kit, which is described in "Security Adapter SDK". You must adapt the applicable parts of the following task instructions to your security adapter.

You must perform the following tasks to set up and test a typical LDAP security adapter authentication architecture:

  1. Verify that all requirements are met. For information on the requirements, see "Requirements for Implementing an LDAP Authentication Environment for Oracle LDAP Client Installation".

  2. Review "About Creating a Database Login for Externally Authenticated Users".

  3. Set up the attributes for users in the directory. See "Setting Up the LDAP Directory".

  4. Create users in the directory: a regular user, the anonymous user, and the application user. See "Creating Users in the LDAP Directory".

  5. Add user records in the Siebel database corresponding to the users in the directory. See "Adding User Records in the Siebel Database".

  6. Edit parameters related to security adapter authentication in the Siebel Application Interface profile. See "LDAP Security Adapter Authentication Parameters in the Siebel Application Interface Profile".

  7. Select the security adapter you want to use (LDAP or Custom) and then configure parameters for the selected security adapter. Use one of the following methods:

    • Use Siebel Management Console

      Start the Siebel Management Console, select the security adapter you want to use (LDAP or Custom), and then specify the appropriate values for the following parameters:

      • Enterprise Security Authentication Profile (Security Adapter Mode)

      • Security Adapter Name (named subsystem)

      For more information, see "Configuring Security Adapters Using the Siebel Management Console".

    • Edit the parameters directly for Siebel Gateway

      You can select the security adapter you want to use, and then configure the parameters for the security adapter by editing the parameters directly using Siebel Server Manager. For more information, see "Configuring Security Adapter Parameters for Siebel Gateway".

    • Edit the application configuration file (Developer Web Clients only)

      For Developer Web Clients only, you configure parameters for the security adapter in the application configuration file. For more information, see "Configuring Security Adapter Parameters for Developer Web Clients". =

  8. (Developer Web Clients only) "Setting a System Preference for Developer Web Clients".

  9. "Restarting Servers".

  10. "Testing the LDAP Authentication System".

Requirements for Implementing an LDAP Authentication Environment for Oracle LDAP Client Installation

This topic describes the requirements for implementing an LDAP authentication environment. The Siebel default authentication method is database authentication but if you want to implement LDAP authentication instead, then verify that the requirements outlined in this topic are in place. This task is a step in "Process of Implementing LDAP Security Adapter Authentication" and "Installing and Configuring Oracle LDAP Client Software".

You must complete the following tasks before you can configure an LDAP security adapter for your environment and install Oracle LDAP Client Software:

  • Install the Web server.

  • Install the LDAP directory.

  • Install the Siebel Enterprise Server components (Siebel Gateway, Siebel Server, and Database Configuration Utilities).

    For information on this task, see Siebel Installation Guide for the operating system you are using.

  • Review "Requirements for the LDAP Directory".

    To implement LDAP authentication, you must be experienced with administering the directory. That is, you must be able to perform tasks such as creating and modifying user storage subdirectories, creating attributes, creating users, and providing privileges to users.

  • (LDAP only) If using LDAP authentication for non-Oracle Database deployments and for deployments with Oracle Database, then you must install the Oracle Database Client, which contains the Oracle LDAP Client software.

    Consider the following requirements for Oracle LDAP Client installation in a Siebel environment:

    • The Oracle LDAP Client must be installed on each Siebel Server or Siebel Gateway computer for which LDAP authentication is to be supported using the LDAP security adapter. For deployments with Oracle Database, the Oracle LDAP Client software can be installed either before or after you install the Siebel Server.

    • Oracle Wallet Manager, which is required if you are supporting TLS, is an application you use to generate wallets. Wallets are containers that store authentication and signing credentials, such as trusted certificates, which are required for Siebel Business Applications to communicate with LDAP directory servers.

    • For deployments with Oracle Database, Siebel Developer Web Client deployments only support database authentication.

    For more information about the requirements for installing the Oracle LDAP Client, see Siebel Installation Guide for the operating system you are using.


    Note:

    If you are using LDAP security adapter authentication, then you must download and install the latest Oracle Database Client (which contains the Oracle LDAP Client) from Oracle Software Delivery Cloud, even if you are using Siebel Business Applications with an Oracle Database and have previously installed the Oracle LDAP Client. Be aware that only one Oracle LDAP Client can be used in a Siebel CRM implementation, so if you download and install the latest Oracle Database Client (containing the Oracle LDAP Client) from Oracle Software Delivery Cloud to enable LDAP authentication, then you must also use this client to connect to your Oracle Database.

  • Have available a URL or hyperlink with which users can access the login form for the Siebel application you are configuring.

About Creating a Database Login for Externally Authenticated Users

A database login must exist for all users who log in to Siebel Business Applications through an external authentication system. If you are implementing LDAP security adapter authentication, then verify that this login name is present; if it does not exist, then create it. This database login must not be assigned to any individual user.

This task is a step in "Process of Implementing LDAP Security Adapter Authentication".

A database login is created for externally authenticated users during the Siebel installation process. If you are using an Oracle or Microsoft SQL Server database, then the account is created when you run the grantusr.sql script. If you are using a DB2 database, then the database administrator manually creates this account. For additional information, see Siebel Installation Guide for the operating system you are using.

The default user ID of the database login account for externally authenticated users is LDAPUSER. A password is assigned to this database account when the account is created. A Siebel application user account corresponding to the LDAPUSER database account is not provided in the seed data and is not required.

Setting Up the LDAP Directory

When you implement LDAP authentication, users are authenticated through a directory. This topic describes how to set up the directory to do the following:

  • Authenticate users through the directory.

  • Allow self-registration.

  • Use the Siebel user ID as the user name.

This task is a step in "Process of Implementing LDAP Security Adapter Authentication".

The following procedure describes how to set up the LDAP directory. For more information about setting up the directory, review "About Setting Up the LDAP Directory".

To set up the LDAP directory 

  1. Determine the Base Distinguished Name, that is, the location in the directory in which to store users. For details, see the Base Distinguished Name (DN) parameter description in "Server Parameters for Siebel Gateway".

    You cannot distribute the users of a single Siebel application in more than one base DN. However, you can store multiple Siebel Business Applications' users in one base DN or in substructures such as organization units (OU), which are used for LDAP.

  2. Define the attributes to use for the following user data. Create new attributes if you do not want to use existing attributes. Suggested attributes to use are as follows:

    • Siebel user ID. Suggested attribute: uid for LDAP.

    • Database account. Suggested attribute: dbaccount.

    • Password. Suggested attribute (for LDAP only): userPassword.

    Optionally, use other attributes to represent first name, last name, or other user data.

Creating Users in the LDAP Directory

This topic describes the users you must create in the LDAP directory to implement LDAP security adapter authentication.

This task is a step in "Process of Implementing LDAP Security Adapter Authentication".

When you use LDAP authentication, you must create the following users in the directory:

  • Application user. Make sure the application user has write privileges to the directory because the security adapter uses application user credentials when using the self-registration component. The application user must also have search privileges for all user records. For additional information, see "Configuring the Application User".

  • Anonymous user. You must define an anonymous user even if your application does not allow access by unregistered users. For more information, see "Configuring the Anonymous User".

  • Records for each user of the Siebel application. Initially, create a test user to verify the authentication system.

  • (Optional) A shared credentials user account. You can also store credentials for the shared database account as profile parameters for the LDAP security adapter profiles. For more information, see "Configuring the Shared Database Account".

Create users in the directory using values similar to those shown in Table 5-2. Store information for users in the directory attributes indicated in "Setting Up the LDAP Directory". Optionally, complete other attribute entries for each user.

Table 5-2 Records in the LDAP Directory

Type of User Siebel User ID Password Database Account

Anonymous user

Enter the user ID of the anonymous user record for the Siebel application you are implementing.

  • You can use a seed data anonymous user record for a Siebel customer or partner application. For example, if you implement Siebel eService, enter GUESTCST.

  • You can create a new user record or adapt a seed anonymous user record for a Siebel employee application.

GUESTPW or a password of your choice.

A database account is not required for the anonymous user if a shared database credentials account is implemented; the database credentials for the anonymous user are read from the shared database account user record or the relevant profile parameter of the LDAP security adapter.

Application user

APPUSER or a name of your choice.

APPUSERPW or a password of your choice.

A database account is not used for the application user.

A test user

TESTUSER or a name of your choice.

TESTPW or a password of your choice.

Database account is not required for any user record, except the anonymous user or the shared credentials user account.

Shared database credentials account user

SharedDBUser or a name of your choice.

The user name and password you specify for the shared database account must be a valid Siebel user name and password.

SharedDBPW or a password of your choice.

username=SHAREDDBUSER password=P

For information about formatting requirements for the database account attribute entry, see "About Setting Up the LDAP Directory".


The example directory entries in Table 5-2 implement a shared credential. The database account for all users is stored in one object in the directory. In this example, the shared database account is stored in the SharedDBUser record. The database account must match the database account you reserve for externally authenticated users which is described in "About Creating a Database Login for Externally Authenticated Users". The P symbol represents the password for that database account. For additional information, see "Configuring the Shared Database Account".

Adding User Records in the Siebel Database

This topic describes how to create a record in the Siebel database that corresponds to the test user record you created in "Creating Users in the LDAP Directory".

This task is a step in "Process of Implementing LDAP Security Adapter Authentication".

You must confirm that the seed data record exists for the anonymous user for your Siebel customer or partner application, as described in Appendix B, "Seed Data". This record must also match the anonymous user you created in "Creating Users in the LDAP Directory".

You can adapt a seed data anonymous user or create a new anonymous user for a Siebel employee application. To adapt a seed anonymous user for a Siebel employee application, add any views to the anonymous user's responsibility that would be required for the employee application, such as a home page view in which a login form is embedded.

For purposes of confirming connectivity to the database, use the following procedure to add the test user for any Siebel application. However, if you are configuring a Siebel employee or partner application, and you want the user to be an employee or partner user, complete with position, division, and organization, then see the instructions for adding such users in "Internal Administration of Users".

The following procedure describes how to add user records to the Siebel database.

To add user records to the database 

  1. Log in as an administrator to a Siebel employee application, such as Siebel Call Center.

  2. Navigate to the Administration - User screen, then the Users view.

  3. In the Users list, create a new record.

  4. Complete the following fields for the test user using values similar to those shown in the following table, then save the record. You can complete other fields, but they are not required.

    Field Guideline
    Last Name Required. Enter any name.
    First Name Required. Enter any name.
    User ID

    Example: TESTUSER

    Required. This entry must match the uid (LDAP) attribute value for the test user in the directory. If you used another attribute, then it must match that value.
    Responsibility Required. Enter the seed data responsibility provided for registered users of the Siebel application that you implement. For example, enter Web Registered User for eService. If an appropriate seed responsibility does not exist, such as for a Siebel employee application, then assign an appropriate responsibility that you create.
    New Responsibility Optional. Enter the seed data responsibility provided for registered users of the Siebel application that you implement. For example, enter Web Registered User for eService. This responsibility is automatically assigned to new users created by this test user.

  5. Verify that the seed data user record exists for anonymous users of the Siebel application you implement. If the record is not present, then create it using the field values in "Seed Users". You can complete other fields, but they are not required.

LDAP Security Adapter Authentication Parameters in the Siebel Application Interface Profile

This topic describes the parameters you must configure in the Siebel Application Interface profile when you implement LDAP security adapter authentication.

Configure the Siebel Application Interface profile parameters using values similar to those shown in Table 5-3. Specify values for Anonymous User Name and Anonymous User Password in the Basic Information - Authentication section of the application interface profile if you are configuring LDAP authentication for all your Siebel Business Applications. If you are implementing LDAP authentication for a single application, then specify these parameters in the Applications section of the application interface profile. For more information, see "Siebel Application Interface Profile Parameters".

This task is a step in "Process of Implementing LDAP Security Adapter Authentication".

Table 5-3 Parameter Configuration in Siebel Application Interface Profile for LDAP Security Adapter

Section in Siebel Management Console Parameter Guideline

Basic Information - Authentication section under Application Interface Profiles

OR,

Applications section under Application Interface Profiles That is, the section that is specific to your application, such as one of the following:

[/eservice/enu]

[/callcenter/enu]

where /enu is the language code for U.S. English.

Anonymous User Name

Enter the user ID of the seed data user record provided for the application that you implement, or of the user record you create for the anonymous user.

This entry also matches the uid (LDAP) entry for the anonymous user record in the directory. For example, enter GUESTCST for Siebel eService.

Anonymous User Password

Enter the password you created in the directory for the anonymous user. For information on this parameter, see "Encrypted Passwords in Siebel Application Interface Profile Configuration".


Configuring Security Adapter Parameters for Siebel Gateway

This topic describes the security-related configuration parameters you use for configuring an LDAP security adapter that are defined in the Siebel Gateway.

You can modify some Siebel Gateway configuration parameters (such as, enterprise profile and object manager parameters) using either Siebel Server Manager or the Siebel Management Console, but others can only be modified using the Siebel Management console. For example, you cannot modify security profile parameters using Siebel Server Manager, you must use the Siebel Management Console to set security profile parameters. For information on using Siebel Server Manager to edit parameters on the gateway, see Siebel System Administration Guide. For information on editing parameters using the Siebel Management Console, see "Configuring Security Adapters Using the Siebel Management Console".

This task is a step in "Process of Implementing LDAP Security Adapter Authentication".

You can set security adapter parameters for Siebel Gateway for the following:

Set security adapter parameters as described in each of these topics. For more information about these parameters, see "Server Parameters for Siebel Gateway".

Parameters for Enterprise, Siebel Servers, or Components

This topic lists security adapter parameters you can set at the Siebel Gateway level, at the Enterprise level, at the Siebel Server level, or at the component level. Applicable components for which you can set these parameters include all Application Object Manager components and the Synchronization Manager component (for Siebel Remote).

To implement LDAP authentication for a single Siebel application, set the parameters for the applicable Application Object Manager component, such as for Siebel Call Center or Siebel eService, using values similar to those in Table 5-4.

Table 5-4 Siebel Gateway Parameters for Enterprise, Server, or Component

Subsystem Parameter Guideline

Security Manager

SecAdptMode

For more information about setting this parameter, see the Enterprise Security Authentication Profile (Security Adapter Mode) parameter in Table A-1.

The security adapter mode in which to operate. For LDAP, specify LDAP.

SecAdptName

For more information about setting this parameter, see the Security Adapter Name (named subsystem) parameter in Table A-1.

The name of the security adapter. For LDAP, specify LDAPSecAdpt or another name of your choice.

The name represents the alias for the enterprise profile (named subsystem) for the specified security adapter.


Parameters for Application Object Manager Components

This topic lists parameters you set for the Application Object Manager component when implementing LDAP authentication for a single Siebel application.

To implement LDAP authentication for a single Siebel application, set the parameters for the applicable Application Object Manager component, such as for Siebel Call Center or Siebel eService, using values similar to those shown in Table 5-5.

Table 5-5 Siebel Server Parameters for Application Object Manager

Subsystem Parameter Guideline

InfraUIFramework

AllowAnonUsers

Enter TRUE for LDAP.

Set this parameter to FALSE if your Siebel application does not use functionality that requires anonymous browsing, such as anonymous catalog browsing or user self-registration.

Object Manager

OM - Proxy Employee (ProxyName)

Enter PROXYE.

OM - Username BC Field (UsernameBCField)

You can leave this parameter empty.



Note:

These parameters (AllowAnonUsers, ProxyName, and UsernameBCField) are server parameters, and they are not available in the Siebel Management Console.

Parameters for Security Adapter (Profile/Named Subsystem)

This topic lists parameters you set for the enterprise profile (named subsystem) for the specific security adapter you are configuring.

To implement LDAP authentication for a single Siebel application, configure parameters for the LDAP Security Adapter (defined as enterprise profile or named subsystem). Typically, the alias for this adapter is LDAPSecAdpt.

Set the security adapter parameters using values similar to those shown in Table 5-6.

Table 5-6 Siebel Gateway Parameters for Enterprise Profile /Named Subsystem

Parameter Guideline

Security Adapter Dll Name

(SecAdptDllName)

For LDAP, enter sscforacleldap.dll

Do not include the file extension (for example, do not specify sscforacleldap.dll for LDAP). The specified value is converted internally to the actual filename for your operating system.

Server Name

Enter the name of the computer on which the LDAP directory server runs.

Port

For LDAP, an example entry is 389. Typically, use port 389 for standard transmission or port 636 for secure transmission.

Base Distinguished Name (DN)

The Base Distinguished Name is the root of the tree under which users are stored. Users can be added directly or indirectly after this directory.

You cannot distribute the users of a single Siebel application in more than one base DN. However, you can distribute them in multiple subdirectories, such as organization units (OU), which are used for LDAP.

LDAP example entry:

   ou=people, o=domainname

In the example, "o" denotes "organization" and is the domain name system (DNS) name for this server, such as computer.example.com. "ou" denotes "organization unit" and is the name of a subdirectory in which users are stored.

User Name Attribute Type

LDAP example entry is uid

If you use a different attribute in the directory for the Siebel user ID, then enter that attribute name.

Password Attribute Type

The LDAP entry must be userPassword.

Credentials Attribute

If you are using an LDAP security adapter, an example entry is mail.

If you used a different attribute in the directory for the database account, then enter that attribute name.

Application User Distinguished Name (DN)

LDAP example entry:

   uid=APPUSER, ou=people, o=domainname

Adjust your entry if your implementation uses a different attribute for the user name, a different user name for the application user, or a different base DN.

Application Password

For LDAP, enter APPUSERPW or the password assigned to the application user.

Shared Database Account Distinguished Name (fully qualified domain name)

LDAP example entry:

   uid=shared database account user User ID, ou=people,
o=domainname

For example:

   uid=SharedDBUser, ou=people, o=example.com

Configuring LDAP Authentication for Developer Web Clients

This topic describes the tasks you must perform if you want to implement LDAP security adapter authentication for Developer Web Clients. This task is a step in "Process of Implementing LDAP Security Adapter Authentication".

To configure LDAP authentication for Developer Web Clients, perform the following tasks:

Configuring Security Adapter Parameters for Developer Web Clients

For Developer Web Clients, security adapter parameters are configured in the configuration file of the application for which you are implementing LDAP security adapter authentication rather than in the gateway.

Parameters in sections of the application configuration file that directly pertain to security adapters apply, in this context, only to the Siebel Developer Web Client. These parameters are counterparts to the parameters (for Siebel Gateway) listed in Table 5-4, Table 5-5, and Table 5-6.

To configure a security adapter for the Developer Web Client, provide parameter values, as indicated by the guidelines in Table 5-7, in the configuration for the Siebel application for which you are implementing LDAP security adapter authentication.

You can use a text editor to make changes to an application's configuration, or you can do so using the Siebel Management Console. For more information about editing an application's configuration and about the purposes for the parameters, see "Siebel Application Configuration Parameters". For a list of Siebel application configuration files, see Siebel System Administration Guide.

Table 5-7 Siebel Application Configuration File Parameters

Section Parameter

[InfraUIFramework]

AllowAnonUsers

For the AllowAnonUsers parameter, enter TRUE for LDAP.

Set this parameter to FALSE if your Siebel application does not use functionality that requires anonymous browsing, such as anonymous catalog browsing or user self-registration.

Note that AllowAnonUsers is a server parameter, and it is not available in the Siebel Management Console.

[InfraSecMgr]

SecAdptMode

For the SecAdptMode parameter, specify LDAP for LDAP.

For more information about setting this parameter, see the Enterprise Security Authentication Profile (Security Adapter Mode) parameter in Table A-1.

SecAdptName

For the SecAdptName parameter, specify LDAPSecAdpt or another name of your choice for LDAP.

For more information about setting this parameter, see the Security Adapter Name (named subsystem) parameter in Table A-1.

[LDAPSecAdpt]

For parameters, see "Configuring Security Adapter Parameters for Siebel Gateway" or Appendix A, "Configuration Parameters Related to Authentication".


Setting a System Preference for Developer Web Clients

If you are configuring LDAP authentication for the Siebel Developer Web Client, then you must set the SecThickClientExtAuthent.system preference to True, as described in this topic.

Setting the SecThickClientExtAuthent. parameter to True allows security adapter authentication for users who log in through the Siebel Developer Web Client. System preferences are enterprise-wide settings, however, the SecThickClientExtAuthent. system preference has no effect on security adapter authentication for users who log in through the Siebel Web Client.

Use the following procedure to specify a value for the SecThickClientExtAuthent. parameter.

To set the SecThickClientExtAuthent parameter 

  1. Log in as an administrator to a Siebel employee application.

  2. Navigate to the Administration - Application screen, then the System Preferences view.

  3. In the System Preferences list, select the SecThickClientExtAuthent system preference.

  4. In the System Preference Value column, enter TRUE.

  5. Restart the Siebel Server.

Restarting Servers

This topic describes the Windows services on the Web server computer that you must restart to activate the changes you make during the process of configuring LDAP security adapter authentication.

This task is a step in "Process of Implementing LDAP Security Adapter Authentication".

Stop and restart the following services:

  • Siebel Server system service. Stop and restart the Siebel Server. For details, see Siebel System Administration Guide.

  • Siebel Gateway system service. Stop and restart the Siebel Gateway. For details, see Siebel System Administration Guide.

Testing the LDAP Authentication System

After performing all the tasks required to implement LDAP security adapter authentication, you can verify your implementation using the procedure in this topic.

This task is a step in "Process of Implementing LDAP Security Adapter Authentication".

The tests outlined in this topic allow you to confirm that the security adapter provided with Siebel Business Applications, your LDAP directory, and the Siebel application you are implementing work together to:

  • Provide a Web page on which the user can log in.

  • Allow an authenticated user to log in.

  • Allow a user to browse anonymously, if applicable to your Siebel application.

  • Allow a user to self-register, if applicable to your Siebel application.

To test your LDAP authentication implementation, perform the following procedure.

To test your LDAP authentication system 

  1. In a Web browser, enter the URL to your Siebel application, for example:

    http://<siebel_AI_host><port_num>/siebel/app/eservice/enu
    

    If the authentication system has been configured correctly, then a Web page with a login form appears, confirming that the anonymous user can successfully access the login page.

  2. Various links provide access to views intended for anonymous browsing. Some other links will require you to log in first.


    Note:

    Employee applications, such as Siebel Call Center, typically do not allow anonymous browsing, while customer applications such as Siebel eService do.

  3. Navigate back to the Web page that contains the login text boxes, and then log in with the user ID and password for the test user you created. Enter TESTUSER or the user ID you created, and TESTPW or the password you created.

    More screen tabs or other application features might appear, indicating that the test user has authenticated successfully. The user record in the database provides views through the expanded responsibility of this registered user.

  4. Click the Log Out link.

  5. Repeat Step 1 to access the login page. If a New User button is present, then click it.

    If a New User button is not present, then your Siebel application, without additional configuration, does not allow users to self-register.

  6. In the Personal Information form, complete the required fields, as shown in the following table, and then submit the form. You can complete other fields, but they are not required.

    Field Description
    Last Name Required. Enter any name.
    First Name Required. Enter any name.
    User ID Required. Enter a simple contiguous user ID, which must be unique for each user. Typically, the user provides this user ID to log in.

    Depending on how you configure authentication, the user might or might not log in with this identifier.

    Password Optional (required for some authentication implementations).

    Enter a simple contiguous login password. The password must conform to the syntax requirements of your authentication system, but it is not checked for conformity in this form.

    For LDAP security adapter authentication, the password is propagated to the user directory. For database authentication, the password is propagated to the database.

    Verify Password Required when Password is required.
    Challenge Question Required. Enter a phrase for which there is an "answer." If you later click Forgot Your Password?, then this phrase is displayed, and you must enter the correct answer to receive a new password.
    Answer to Challenge Question Required. Enter a word or phrase that is considered the correct answer to the challenge question.

  7. Navigate to the page containing the login text fields.

  8. Login using the user ID and password you created in Step 6.

    If the authentication system has been configured correctly, then you can log in successfully and can navigate in the screens provided for registered users.