Your demo application allows everyone to have complete access to every page, which is very unusual for a web application. This chapter examines the APEX facilities for restricting access. These facilities can be divided into authentication, which identifies the legal users, and authorization, which specifies what information each legal user is allowed to see. You will also consider the issue of how to protect the data from malicious users.


Authentication Scheme Malicious User Security Section Custom Authentication Scheme User Table 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Edward Sciore 2015

Authors and Affiliations

  • Edward Sciore
    • 1
  1. 1.MAUSA

Personalised recommendations