O'Reilly logo

Applied Oracle Security by Bryan Wise, Richard Wark, Patrick Sack, Tyler Muth, Hamza Jahangir, Scott Gaetjen, David Knox

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 12Secure Coding Practices in APEX

This chapter shifts focus from securing the Application Express environment to securing an individual application. The concepts involved in creating a secure application using APEX are very similar to those of other database-centric technologies. Data should be secured at the lowest level possible using techniques such as Virtual Private Database (VPD), Oracle Label Security (OLS), Programmatic Encryption, and Transparent Data Encryption (TDE). End users must be authenticated against some credential store, such as an Lightweight Directory Access Protocol (LDAP) directory or Oracle Access Manager. A user’s authorization rights or privileges should also be pulled from a central source such as Oracle Access ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required