Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java by David Coffin
Author:David Coffin
Language: eng
Format: epub, pdf
Publisher: Apress®
Published: 2011-09-13T16:00:00+00:00
Listing 10-1. Application Registry Table of Salient Features
CREATE TABLE appsec.t_application_registry
(
application_id VARCHAR2(24 BYTE) NOT NULL,
app_user VARCHAR2(20 BYTE) NOT NULL,
app_role VARCHAR2(20 BYTE) NOT NULL
);
We will also create a view of the table for general use. And, though not shown here, we will make the application_id and app_user columns a unique index and our primary key. We will not depend on that key until we get to Chapter 12. For now, suffice it to say that each application may use multiple secure application roles. We will acquire these roles by proxying through a variety of application users. So a pair of application_id and app_user is a unique key to acquire an app_role.
While we're at it, let's insert a data record with the labels we already know: user APPUSR and role HRVIEW_ROLE. We give those settings to the application_id of HRVIEW, as shown here:
INSERT INTO appsec.v_application_registry ( application_id, app_user, app_role )
VALUES ( 'HRVIEW', 'APPUSR', 'HRVIEW_ROLE' );
We are introducing the application_id column here as a handle to acquire the required role. Each application will need a unique application_id, which, with a couple more additions, will allow our existing code to provide two-factor authentication, SSO, and secure application roles to multiple applications.
Download
Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java by David Coffin.pdf
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(16176)
The Mikado Method by Ola Ellnestam Daniel Brolund(13458)
Hello! Python by Anthony Briggs(13250)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(12397)
Dependency Injection in .NET by Mark Seemann(12259)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(11012)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(10874)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10540)
Grails in Action by Glen Smith Peter Ledbrook(10328)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(10285)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9595)
Hit Refresh by Satya Nadella(9040)
Kotlin in Action by Dmitry Jemerov(9026)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8699)
The Kubernetes Operator Framework Book by Michael Dame(8488)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8309)
Robo-Advisor with Python by Aki Ranin(8262)
Practical Computer Architecture with Python and ARM by Alan Clements(8234)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8204)