Preface |
|
1 | (4) |
|
Chapter 1 User Authentication |
|
|
5 | (38) |
|
User authentication concepts in Siebel CRM |
|
|
5 | (3) |
|
|
8 | (3) |
|
Security adapters are defined as enterprise profiles |
|
|
8 | (1) |
|
Associating a security adapter with a server component |
|
|
9 | (1) |
|
Managing user accounts for database authentication |
|
|
10 | (1) |
|
Directory server authentication |
|
|
11 | (22) |
|
Installing the directory server (optional) |
|
|
12 | (1) |
|
Installing the IBM LDAP Client |
|
|
12 | (2) |
|
Creating user accounts in the directory server |
|
|
14 | (1) |
|
Creating the shared credentials account |
|
|
15 | (2) |
|
Creating the anonymous user accounts |
|
|
17 | (2) |
|
Setting access permissions for LDAP accounts |
|
|
19 | (1) |
|
Verifying the proxy account |
|
|
20 | (1) |
|
Configuring the LDAP Security Adapter |
|
|
21 | (2) |
|
Configuring server components |
|
|
23 | (1) |
|
Verifying LDAP authentication |
|
|
24 | (1) |
|
|
24 | (2) |
|
Configuring the Siebel Gateway Name Server for LDAP authentication (optional) |
|
|
26 | (3) |
|
Verifying LDAP authentication for the Siebel Gateway Name Server |
|
|
29 | (1) |
|
Configuring Siebel clients for LDAP authentication (optional) |
|
|
29 | (1) |
|
Setting the SecThickClientExtAuthent system preference to TRUE |
|
|
30 | (1) |
|
Creating the central authentication configuration file |
|
|
31 | (1) |
|
Modifying the client configuration file |
|
|
32 | (1) |
|
Verifying directory server authentication for the Siebel client |
|
|
32 | (1) |
|
|
33 | (8) |
|
Creating a non-anonymous virtual directory on the web server |
|
|
35 | (2) |
|
Creating or verifying user accounts in the external authentication system |
|
|
37 | (1) |
|
Modifying the Siebel Web Server Extension configuration file |
|
|
37 | (2) |
|
Modifying the LDAP security adapter |
|
|
39 | (1) |
|
Verifying the Web SSO configuration |
|
|
39 | (2) |
|
|
41 | (2) |
|
Chapter 2 User Authorization and Access Control |
|
|
43 | (32) |
|
Understanding Siebel Access Control |
|
|
44 | (1) |
|
Controlling access to Siebel views |
|
|
45 | (9) |
|
The importance of business process analysis |
|
|
46 | (1) |
|
Using responsibilities to control access to views |
|
|
47 | (2) |
|
Creating or modifying responsibilities |
|
|
49 | (1) |
|
Understanding the implications of view access |
|
|
50 | (1) |
|
Controlling view access on local databases |
|
|
51 | (1) |
|
Controlling read-only behavior of views |
|
|
52 | (1) |
|
Controlling the tab layout for screens and views |
|
|
53 | (1) |
|
Controlling access to customer data |
|
|
54 | (10) |
|
Controlling record access for a single user or employee |
|
|
55 | (3) |
|
Controlling record access for multiple employees |
|
|
58 | (2) |
|
Controlling record access for teams based on positions |
|
|
60 | (2) |
|
Controlling record access for different companies based on organizations |
|
|
62 | (2) |
|
Controlling access to master data |
|
|
64 | (3) |
|
Personalized access to features and data |
|
|
67 | (6) |
|
Controlling access to applets and views based on personalization |
|
|
68 | (3) |
|
Controlling data display based on personalization |
|
|
71 | (2) |
|
|
73 | (2) |
|
Chapter 3 Managing User Accounts |
|
|
75 | (12) |
|
Understanding divisions and organizations |
|
|
75 | (5) |
|
|
76 | (2) |
|
|
78 | (2) |
|
Setting up and managing the position hierarchy |
|
|
80 | (2) |
|
Multiple positions for an employee |
|
|
82 | (1) |
|
Setting up user and employee accounts |
|
|
82 | (3) |
|
Creating or verifying user accounts in the authentication system |
|
|
84 | (1) |
|
|
85 | (2) |
Index |
|
87 | |