C H A P T E R  12

Administration of Security

Now that we have built Oracle structures and Oracle and Java code, we will need to maintain the data that keeps it running. Primarily, this data consists of users, proxy grants, application registrations, and application connection strings. It has not been too difficult to execute SQL scripts to insert records for one or two users, and one or two applications—especially while we are studying the issues and requirements. But in a year or so, the steps to accomplish these tasks will be long forgotten, along with the reasons for doing them.

However, if we can encapsulate the business rules, logic, and procedure steps in a user-friendly application, we will have a much easier time adding new users and ...

Get Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.