Authentication trouble

Posted on 2007-08-01
Last Modified: 2013-12-24

We are implementing the SSO for our application.
We are implementing the SSO through the LDAP Directory for Authentication.
We have installed Webgate Plugin and also using the Oracle Access Manager.
We have configured the CFG(eapps.cfg and application cfg) file as per the guidelines. We are implementing the Sample Security Adapter. We have not modified the code provided in the CPP file provided by Siebel for 7.8 SDK.
We have configured the URL with the logon page. So whenever user will request the URL(Application) the logon page(Company Logon Page) appear and ask for the logon credential.

We are facing the problem; Ideally, when user enters credential then after successfull logon it should navigate to the application home page.
But we are not navigating to the home page. After taking 30-40 minutes it's giving error:" Page can't be found".

For your infomation:
HeaderVar SOMETHING mail

<removed for security concerns by AnnieMod -- Cleanup Admin>
Please let us know where we are getting wrong. Also let us know if you want more information from our side.
Please provide us the solution as soon as possible.

Thanks in Advance.
Question by:theGhost_k8
    LVL 18

    Accepted Solution

    This is how SIEBEL log a user in:
    -it authenticates the anonymous user to display the logon page (this user should NOT be a priviledged user!)
    -it uses the DBUser to connect to the db and search for this anonymous rights
    -if your logon page appears, it prooves your security DLL is working
    -it authenticates the logon user and display his home page after connecting in the db to through the same DBUser
    -it checks for the user priviledges

    Your problem is due to bad configuration of the Application.cfg (or server parameters). The solution is for you to read the logs from SWEApp\log (should show a "cannot connect blabla") and those from siebsrvr\log for your application server
    LVL 1

    Expert Comment

    Forced accept.

    EE Admin

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Introduction: Often, when running a query with joins, the results show up "duplicates", and often, those duplicates can be "eliminated" in the results using DISTINCT, for example. Using DISTINCT is simple: just add it after the SELECT keyword, an…
    Introduction: I have seen many questions on EE and elsewhere, asking about how to find either gaps in lists of numbers (id field, usually) ranges of values or dates overlapping date ranges combined date ranges I thought it would be a good …
    Video by: Steve
    Using examples as well as descriptions, step through each of the common simple join types, explaining differences in syntax, differences in expected outputs and showing how the queries run along with the actual outputs based upon a simple set of dem…
    Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    10 Experts available now in Live!

    Get 1:1 Help Now