Application Authorization Overview

We are going to implement this entirely with Oracle database as the backend, of course running with the Oracle JVM. That means we have to deal with one important security aspect. To talk to Oracle database at all, we need to connect with a user and password. We will spend significant time addressing that issue.

In a nutshell, here is how we will do Application Authorization, which we will also refer to as Application Verification:

  1. We will first connect to Oracle, proxying through a new user, appver.
  2. As in the past, we will need to pass the SSO and two-factor authentication requirements.
  3. Once we have attained two-factor authentication, we exchange encryption keys.
  4. We also retrieve an encrypted list of connection ...

Get Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.