CHAPTER3Understanding Identification and Authentication

Before you begin to code your database applications, you should have a clear understanding of the security design. This is critical because the design decisions you make before you begin to build determine how effective your security implementation will be once you have built it.

In this chapter, we will review the first steps in the security process known as identification and authentication (I&A). I&A is the necessary base step upon which the database security depends. Therefore, your I&A design decisions are very important. The material presented here will provide supporting information that you can use in determining which methods are appropriate for your organization.

In today’s world, ...

Get Effective Oracle Database 10g Security by Design now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.