Abstract
Before users can access APEX applications, they have to log in. This is typically done by providing a user name and corresponding password. If the credentials match, then a user becomes authenticated and can proceed to use the application. If not, then the user will be prompted to try again. Too many invalid attempts, and the account may become disabled, requiring an administrator to intervene.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2013 Scott Spendolini
About this chapter
Cite this chapter
Spendolini, S. (2013). User Authentication. In: Expert Oracle Application Express Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-4732-6_8
Download citation
DOI: https://doi.org/10.1007/978-1-4302-4732-6_8
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-4731-9
Online ISBN: 978-1-4302-4732-6
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)