O'Reilly logo

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java by David Coffin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Authenticate on a Separate Oracle Instance

I'm going to describe something now that reveals the extent to which we might want to pursue security. What if we segregated the application verification tasks from the actual application data? What security would that buy us? The primary benefits we will achieve are the following:

  • Fewer accounts with passwords, so fewer accounts to attack
  • Reduced ancillary functions (fewer optional database programs), so reduced vulnerabilities
  • Ability to revoke some PUBLIC access to particularly revealing data dictionary views without hampering database development
  • A first database hurdle for hackers to overcome before sensitive data in the second database can be pursued by attack

In this section, we will create ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required