Summary
In this chapter we have learned about APEX security settings that we can apply to make our applications more secure. In particular, we have seen how to create Authentication Schemes to control access to our application and Authorization Schemes to control access within our application. We have also seen how to protect the session state of our application and apply application-wide security settings using security attributes. APEX makes it very easy for us to quickly apply security settings to our application and prevent unauthorized access to our applications.
In the next chapter we will look at how we can convert Microsoft Access and Oracle Forms applications to APEX.