Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Oracle Application Express 3.2 - The Essentials and More

You're reading from   Oracle Application Express 3.2 - The Essentials and More Develop Native Oracle database-centric web applications quickly and easily with Oracle APEX

Arrow left icon
Product type Paperback
Published in Jun 2010
Publisher Packt
ISBN-13 9781847194527
Length 644 pages
Edition 1st Edition
Languages
Arrow right icon
Toc

Table of Contents (30) Chapters Close

Oracle Application Express 3.2
Credits
About the Authors
About the Reviewers
1. Preface
1. An Introduction to APEX FREE CHAPTER 2. What we need to know to effectively use APEX 3. APEX Basic Concepts 4. The Application Builder Basic Concepts and Building Blocks 5. APEX Items 6. APEX Buttons 7. APEX Computations 8. APEX Validations 9. APEX Processes 10. APEX Branches 11. APEX SQL Workshop 12. APEX Forms 13. APEX Reports 14. Tabular Forms 15. Calendars 16. Interactive Reports 17. AJAX with APEX 18. Globalization and Localization With APEX Applications 19. Right-To-Left Support in APEX 20. Deploying APEX Applications 21. The APEX Runtime Environment 22. Security 23. Application Conversion 24. APEX Best Practices APEX Installation, Upgrade, and Configuration Tips

APEX security features overview


When implementing security in our applications, there are many features we need to have in place, such as authentication, authorization, and auditing. In APEX, these and other security features can be found in the Shared Components section of our application. This section provides a central point where we can define and apply security settings for our application. In the following screenshot we can see links to the security functions provided by APEX, which include the following:

  • Authentication Schemes: These are used to determine the identity of users and control who can access our applications

  • Authorization Schemes: These are used to control what functionality a user can access within our applications once they are logged in

  • Session State Protection: This is used to prevent tampering of application URLs and session item values stored in APEX

  • Security Attributes: This is used to enter security attributes for the entire application

In this chapter we will...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image