O'Reilly logo

Effective Oracle Database 10g Security by Design by David Knox

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER3Understanding Identification and Authentication

Before you begin to code your database applications, you should have a clear understanding of the security design. This is critical because the design decisions you make before you begin to build determine how effective your security implementation will be once you have built it.

In this chapter, we will review the first steps in the security process known as identification and authentication (I&A). I&A is the necessary base step upon which the database security depends. Therefore, your I&A design decisions are very important. The material presented here will provide supporting information that you can use in determining which methods are appropriate for your organization.

In today’s world, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required