O'Reilly logo

Effective Oracle Database 10g Security by Design by David Knox

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER4Connection Pools and Proxy Authentication

In this chapter, you’ll explore identification and authentication (I&A) examples as related to Oracle. Our discussion begins with a brief history of authentication strategies. To put today’s security environment in perspective, you’ll briefly explore the previous computing architectures: host-based systems, the use of operating system authenticated users, and the client-server I&A model.

Web applications have their own special set of security challenges and requirements. Among them is how to effectively connect application users to the database in a way that meets the high-throughput demands of the Web and preserves end-to-end security. The predominant connection technique used today relies on ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required