O'Reilly logo

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java by David Coffin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Get a List of Application Connection Strings: The Server Side

Here we are at that foreboding Oracle stored procedure with a dozen IN and OUT parameters, p_get_app_conns. But that is not what is notable about this procedure. Rather, the internal workings are what we need to give attention to. However, even those are familiar.

If we pass SSO, then we deal with two-factor authentication. If the user did not submit a two-factor code, we call the f_send_2_factor function, passing our validated user name and the application_id in order to create, distribute and cache (store in a table) a two-factor code for this user in this application.

However, if the user did submit a two-factor authentication code, then we call the f_is_cur_cached_cd function, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required