O'Reilly logo

Understanding Oracle APEX 5 Application Development, Second Edition by Edward Sciore

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 12

image

Security

Your demo application allows everyone to have complete access to every page, which is very unusual for a web application. This chapter examines the APEX facilities for restricting access. These facilities can be divided into authentication, which identifies the legal users, and authorization, which specifies what information each legal user is allowed to see. You will also consider the issue of how to protect the data from malicious users.

Authentication

Authentication is the ability to identify the current user of the application. APEX users identify themselves by providing a username and password. APEX supports several possible ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required