O'Reilly logo

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java by David Coffin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Add/Modify User Functional Screen

Before we delve into the code and operation of our Add/Modify User functional screen, let's review the reasons we have this screen in the first place. Recall that we added a table in the HR schema named t_emp_mobile_nos. We are using that table to store cell phone and pager numbers, and we also store (for convenience) the operating-system user ID of the employee. We need to maintain that data to accomplish both single sign-on and two-factor authentication. Additionally, we use the e-mail address in the HR.EMPLOYEES table for two-factor authentication, so we want to be able to edit that.

In order to maintain the HR data, we want a functional screen like our Add/Modify User screen, shown in Figure 12-3. This security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required