Oracle Structures Supporting Two-Factor Authentication
In order to accomplish two-factor authentication, we will create some new tables and incorporate them into our security processes. We will create a table to hold cell phone and pager numbers for users. Additionally, we will create a table to hold the SMS gateway address for each cell phone carrier whose phones we need to support. During our 10-minute cache timeout period, while we wait for the 2-factor codes to be delivered to the user’s cell phone, pager or e-mail, we will store the two-factor codes in the Oracle database, in another new table that we will create.
In addition to new tables, we will also create functions to send and to test the two-factor codes. We will also modify the
Get Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.