If you’ve already begun creating end user applications in your PHP and Oracle Database XE environment, you’ve probably revisited the age-old question: do you enforce security at the database or in your PHP application? In Chapter 14, you explored many authentication methods, one of which includes storing your authentication information in a database table. However, you must also protect the table that has the authentication information. Using Oracle Database XE’s native security features has the key advantage of preventing unauthorized access regardless of the application you use to retrieve and modify data in the database, whether it be a PHP application, a Microsoft Access application using ODBC, or a dial-in user with SQL*Plus.
KeywordsAudit Trail Statement Audit Database User Grant Option Oracle Database
Unable to display preview. Download preview PDF.