O'Reilly logo

Oracle Application Express 3.2 by Matthew Lyon, Arie Geller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Authentication Schemes

The first task when implementing security is to determine the identity of the user trying to access the application. This is commonly achieved via a login page where a username and password are entered. A login page may also include a digital certificate or secure key as an additional measure, in order to verify that the user is who they actually say they are. The login details are then validated against a user repository to check whether the user account exists and the password entered is correct. If the user passes these checks they are allowed to access the application.

In APEX, we implement this authentication process through the use of Authentication Schemes. Authentication Schemes are a standard way to handle the processing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required