O'Reilly logo

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java by David Coffin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Save Connection Strings from the Server Perspective

On the Oracle database side, we go through a rather elaborate process in order to get the connsHash table of connection strings into the shape we want before storing them. You see, when we submit them to Oracle, they are encrypted with the secret password key that is unique to this session. If we were to store them as is, we could never decrypt them after this session closes; so we will decrypt them before storage on Oracle database. We will explore and apply encryption to data on disk when we get to Chapter 11. The decryption process, however, is preceded by an equally elaborate process to assure that the application class being submitted is appropriate for either overwriting an existing entry ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required