Save Connection Strings from the Server Perspective

On the Oracle database side, we go through a rather elaborate process in order to get the connsHash table of connection strings into the shape we want before storing them. You see, when we submit them to Oracle, they are encrypted with the secret password key that is unique to this session. If we were to store them as is, we could never decrypt them after this session closes; so we will decrypt them before storage on Oracle database. We will explore and apply encryption to data on disk when we get to Chapter 11. The decryption process, however, is preceded by an equally elaborate process to assure that the application class being submitted is appropriate for either overwriting an existing entry ...

Get Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.