9.5. Summary

This chapter adds the final piece to your initial exploration of APEX development. You have learned how to use the built-in security features of the environment to shape the way that different users access data and application components.

In this chapter you:

  • Defined additional users.

  • Added these users to an authentication scheme.

  • Created an ACL page and authorization schemes.

  • Added users to the authentication schemes and used them to limit access.

  • Used the conditions for different APEX components to put your new security to work.

You should step back and realize that the authentication and authorization capabilities of your application are built into the APEX environment. Although you had to create users and assign access control for different components, this process merely instituted specific limitations — you did not have to build or add the security framework.

This chapter concludes your quick tutorial on creating applications with APEX. In the rest of this book, you will learn more about managing APEX applications, using packaged APEX applications, and look at the possibility of migrating existing applications to the world of APEX.

Get Beginning Oracle® Application Express now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.