Abstract
Before you go live with an application, it is important to apply proper security measures. One of the most basic forms of protection that any web application must have is the enforcement of an authentication and authorization policy. Authentication deals with identifying users to the application; you’ve already implemented it in this application using a custom authentication scheme: a username and password. Authorization is the process of assessing whether the authenticated user is privileged to access certain data or perform a particular action. Recall that you have already laid the foundation of application authorization in Chapter 6, where you specified the application segments to which you want to apply authorization. Then, you created user groups and provided them with the appropriate application access privileges. In this chapter, you will create a bunch of authorization schemes to protect your application. These schemes will be created to protect menus, pages, buttons, and processes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Riaz Ahmed
About this chapter
Cite this chapter
Ahmed, R. (2019). Application Security. In: Cloud Computing Using Oracle Application Express. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4243-8_31
Download citation
DOI: https://doi.org/10.1007/978-1-4842-4243-8_31
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-4242-1
Online ISBN: 978-1-4842-4243-8
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books