2011 | OriginalPaper | Buchkapitel
Authentication and User Management
verfasst von : Tim Fox, John Edward Scott, Scott Spendolini
Erschienen in: Pro Oracle Application Express 4
Verlag: Apress
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
Controlling who can and who can’t access your application is an extremely important consideration when designing your applications. The authentication method you choose for your application will define how the identity of users is determined and verified. A comprehensive security model will also address authorization—the process of specifying what a user can do once he is logged into an application.