Chapter Review

Now you have a security administrator user who is not a DBA, but who can handle most of the Oracle security tasks required. Also, you have an application security user who will be handling the transactions we require for Oracle application security.

You have locked down our Oracle database and added some basic auditing, and learned about the data dictionary views. We discussed roles: predefined roles, default roles, non-default roles, and secure application roles. In our first foray into application security, we built a couple of secure application roles and the procedures that protect them.

In the application data schema, HR, we distinguished between sensitive and non-sensitive data and created a public view of only the non-sensitive ...

Get Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.