C H A P T E R  15

Images

Security-Related Issues

In the previous chapter, we discussed the performance and scalability benefits of using connection pooling. In this chapter, we'll direct our attention to the security issues involved in a three-tier architecture that uses connection pooling. In particular, we'll focus on different alternatives of mapping an application end user to a database end user and different ways in which an application can authenticate to the database on behalf of an end user. We'll cover the following authentication alternatives:

  • The application server authenticates to the database by presenting the password of the database ...

Get Expert Oracle JDBC Programming now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.