Chapter Review

In this chapter, we discussed how to identify the Windows or UNIX user using the JAAS classes, NTSystem, and UnixSystem. Because those classes are not provided cross-platform, we delved into using reflection to both instantiate and call methods in those classes.

After establishing the OS identity, we explored the code needed to use that identity when authenticating to Oracle Database. The end goal is that our Oracle application users will be able to use our applications without entering their passwords. In fact, they won't need passwords at all on Oracle database, but we will be able to track each user's actions by one of two methods:

1)  We set the connection client identifier equal to the user ID and then assure it exists in ...

Get Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.