O'Reilly logo

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java by David Coffin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Testing Two-Factor Authentication

In this section, we again draw on all our resources to demonstrate and test two-factor authentication along with everything else we have discussed so far. We will test our two-factor authentication by using the code we have been examining to generate and transmit two-factor authentication codes. In order to experience this fully, you will need to enter your pager, cell phone, and/or e-mail addresses in the database, as we described. Alternatively, you can query the database to select the generated two-factor codes from the appsec.v_two_fact_cd_cache view.

If you haven’t been executing the SQL commands we’ve been exploring throughout this chapter as we discussed them, you will need to open the Chapter9 folder ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required