Get a List of Application Connection Strings: The Server Side

Here we are at that foreboding Oracle stored procedure with a dozen IN and OUT parameters, p_get_app_conns. But that is not what is notable about this procedure. Rather, the internal workings are what we need to give attention to. However, even those are familiar.

If we pass SSO, then we deal with two-factor authentication. If the user did not submit a two-factor code, we call the f_send_2_factor function, passing our validated user name and the application_id in order to create, distribute and cache (store in a table) a two-factor code for this user in this application.

However, if the user did submit a two-factor authentication code, then we call the f_is_cur_cached_cd function, ...

Get Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.