Application Settings

  • Scott Spendolini


Securing an instance of APEX starts at the instance level and continues down to the workspace level. However, merely securing a few attributes or even putting the entire instance in runtime mode is nowhere near enough protection to completely secure your applications. Some of the most important security settings can be controlled only at the application level. Fortunately, many of these settings are declarative in nature, making it relatively simple to secure.


Mobile Application Authentication Scheme Business Rule Application Setting Desktop Application 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Scott Spendolini 2013

Authors and Affiliations

  • Scott Spendolini

There are no affiliations available

Personalised recommendations