Chapter 2. Authentication and User Management

Controlling who can and who can't access your application is an extremely important consideration when designing your applications. The authentication method you choose for your application will define how the identity of users is determined and verified. A comprehensive security model will also address authorization—the process of specifying what a user can do once he is logged into an application.

As you'll learn in this chapter, APEX allows you to define many different authentication schemes in your application. However, only one of the schemes can be set as the current one. You can use one of the preconfigured authentication schemes or create your own from scratch, enabling you to build any logic ...

Get Pro Oracle Application Express 4, Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.