Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Oracle Application Express 3.2 - The Essentials and More

You're reading from   Oracle Application Express 3.2 - The Essentials and More Develop Native Oracle database-centric web applications quickly and easily with Oracle APEX

Arrow left icon
Product type Paperback
Published in Jun 2010
Publisher Packt
ISBN-13 9781847194527
Length 644 pages
Edition 1st Edition
Languages
Arrow right icon
Toc

Table of Contents (30) Chapters Close

Oracle Application Express 3.2
Credits
About the Authors
About the Reviewers
1. Preface
1. An Introduction to APEX FREE CHAPTER 2. What we need to know to effectively use APEX 3. APEX Basic Concepts 4. The Application Builder Basic Concepts and Building Blocks 5. APEX Items 6. APEX Buttons 7. APEX Computations 8. APEX Validations 9. APEX Processes 10. APEX Branches 11. APEX SQL Workshop 12. APEX Forms 13. APEX Reports 14. Tabular Forms 15. Calendars 16. Interactive Reports 17. AJAX with APEX 18. Globalization and Localization With APEX Applications 19. Right-To-Left Support in APEX 20. Deploying APEX Applications 21. The APEX Runtime Environment 22. Security 23. Application Conversion 24. APEX Best Practices APEX Installation, Upgrade, and Configuration Tips

Chapter 22. Security

Security is an important feature when building applications, as it enables us to prevent unauthorized access and activity in our applications. Not all applications require security; a public website doesn’t for example. However, for many applications, we need to be able to control who can run and gain access to them. Once a user is logged into our application, we also need to further control what functionality they have permission to access. In APEX, these security features are implemented through the use of Authentication and Authorization Schemes. These schemes enable us to declaratively define security for our applications quickly and easily. In this chapter we will explore how to use these and other features to implement security in our applications. Specifically, we shall be looking at:

  • Authentication Schemes

  • Authorization Schemes

  • Session State Protection

  • Security Attributes

APEX security features overview

When implementing security in our applications, there are many...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image