Chapter Review

We enabled Oracle Database to send E-Mail messages and to browse to web pages. Using those abilities, we developed a process to send 2-factor authentication codes to our application users on their cell phones, pagers and e-mail accounts. Users will have to enter those 2-factor codes in order to get access to our application data.

We built a table to hold mobile phone numbers for users and another to hold web addresses of SMS gateways for each cell phone carrier. We also added a table to hold cached 2-factor codes.

We implemented foreign keys to maintain referential integrity between our tables. And we discussed a coding standard for exchanging dates between Oracle Database and Java.

An overview of the 2-factor code distribution ...

Get Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.