how to Handle Security In Oracle APEX
Security In Oracle APEX
Security Attributes
Authentication Schemes
Authorization Schemes
Application Access Control
Session State Protection
مدرب الدورة
ali saleh
Senior Oracle Apex Developer
Senior Oracle Apex Developer
10 Years of Experience
Working as senior developer on Pl/Sql and Oracle Apex Development Projects.
Confident, capable, detail-oriented – works equally well in self-directed and team environment.
Strong background in advanced APEX applications, technical analysis, requirements analysis.
Having 12 years of IT experience out of which 9 years on APEX (3.2, 4.1, 4.2 ,5,5.1 ,18.1,18.2,19.1), SQL, PL/SQL.
Ability to work with (region – form – dynamic action – validation -computation – report – branching ) .
used Oracle Application Express to develop Online applications and well as stand-Alone applications.
Used BI Publisher, BIRT and jasper and Altova StyleVision to build Reports in PDF
Implemented Oracle Apex to develop HR system, customer services and financial system.
Designed the Database using data modeler.
Oracle Apex Training in it-help training center and logic training center and Online
محتويات الدورة
Authentication Schemes Types | |||
Authentication Schema | 00:07:31 | ||
(Database Accounts (Authentication Schema | 00:03:09 | ||
( No ( Authentication Schema | 00:02:19 | ||
(Custom ( Authentication Schema | 00:09:43 | ||
( Open Door ( Authentication Schema | 00:02:29 | ||
( Other Type ( Authentication Schema | 00:03:13 | ||
Authentication Schema Property | |||
( Login Function ( apex_authentication.login | 00:02:00 | ||
Subscription | 00:05:30 | ||
Sentry Function | 00:12:05 | ||
Invalid Session Procedure | 00:05:41 | ||
Post Logout Procedure | 00:03:32 | ||
Legacy Attributes & Source | 00:02:27 | ||
Session Not Valid | 00:06:56 | ||
Pre-Authentication Procedure | 00:03:29 | ||
Post-Authentication Procedure | 00:02:11 | ||
Switch in Session | 00:03:01 | ||
Help Text | 00:01:25 | ||
Post-Logout URL | 00:01:32 | ||
Session Sharing | 00:08:33 | ||
Authorization Schemes | |||
( Authorization Scheme ( Intro | 00:12:02 | ||
(Authorization Evaluation Point ( Once per session | 00:03:16 | ||
( Authorization Evaluation Point ( Once per Page View | 00:01:42 | ||
( Authorization Evaluation Point ( Once per component | 00:03:06 | ||
(( Authorization Evaluation Point (Always (No Caching | 00:02:54 | ||
where we can apply Authorization | 00:13:18 | ||
( Exists SQL Query ( Authorization Scheme Type | 00:07:24 | ||
( Not Exists SQL Query ( Authorization Scheme Type | 00:04:29 | ||
( Item in Expression 1 is null ( Authorization Scheme Type | 00:04:30 | ||
( Item in Expression 1 is Not null ( Authorization Scheme Type | 00:03:06 | ||
( PL-SQL Function Returning Boolean ( Authorization Scheme Type | 00:07:15 | ||
( Value of Item in Expression 1 Equals Expression 2 ( Authorization Scheme Type | 00:06:41 | ||
( Value of Item in Expression 1 Doesn’t Equals Expression 2 ( Authorization Scheme Type | 00:04:16 | ||
Value of Preference in Expression 1 Equals Expression 2 | 00:06:41 | ||
Value of Preference in Expression 1 Does NOT Equal Expression 2 | 00:03:51 | ||
( Is In Role or Group ( Authorization Scheme Type | 00:06:38 | ||
( Is Not In Role or Group ( Authorization Scheme Type | 00:04:24 | ||
( Use Custom User with ( Is In Role or Group | 00:02:29 | ||
Application Access Control | |||
( Application Access Control ( from shared component and Used Tables | 00:08:27 | ||
( Create Custom Page for ( Application Access Control | 00:12:43 | ||
Create ( Application Access Control ) feature | 00:15:13 | ||
understand Build Option for [ Access Control ] Feature | 00:06:33 | ||
understand Application Settings for [ Access Control ] Feature | 00:06:15 | ||
Using [ APEX_ACL API ] Part 1 | 00:14:15 | ||
Using [ APEX_ACL API ] Part 2 | 00:10:16 | ||
Session State Protection | |||
Understand [ Session state ] and item to [ submit ] concept | 00:12:11 | ||
Accessing values in session state | 00:14:35 | ||
( Session State Protection ( intro | 00:02:04 | ||
( Page Access Protection ( Unrestricted | 00:04:58 | ||
(Page Access Protection (Arguments Must Have Checksum | 00:07:14 | ||
( Page Access Protection ( No Arguments Supported | 00:03:12 | ||
( Page Access Protection ( No URL Access | 00:05:24 | ||
( Item Access Protection ( Unrestricted | 00:06:31 | ||
( Item Access Protection ( Checksum Required – Application Level | 00:03:14 | ||
( Item Access Protection ( Checksum Required – User Level | 00:04:37 | ||
( Item Access Protection ( Checksum Required – Session Level | 00:02:31 | ||
( Item Access Protection ( Restricted – May not be set from browser | 00:04:11 | ||
Session State Protection for Application Items | 00:03:45 | ||
Application Session State Protection Controls | 00:04:48 | ||
Security Attributes | |||
( Security Attributes ( Authentication | 00:06:46 | ||
( Security Attributes ( Authorization | 00:04:04 | ||
Rejoin Sessions | 00:06:24 | ||
Deep Linking | 00:05:48 | ||
Maximum Session Length | 00:05:06 | ||
Maximum Session Idle Time | 00:05:52 | ||
(Security Attributes (Session State Protection | 00:02:34 | ||
( Security Attributes ( Browser Security | 00:05:56 | ||
( Security Attributes (Database Session | 00:05:38 | ||
Web Credentials | |||
( Web Credentials ( intro | 00:01:54 |
تقييم الدورة
لا يوجد تقييمات لهذا الكورس.