User Authentication

  • Scott Spendolini


Before users can access APEX applications, they have to log in. This is typically done by providing a user name and corresponding password. If the credentials match, then a user becomes authenticated and can proceed to use the application. If not, then the user will be prompted to try again. Too many invalid attempts, and the account may become disabled, requiring an administrator to intervene.


Authentication Scheme Malicious User Custom Authentication Scheme Session State Valid Section 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Scott Spendolini 2013

Authors and Affiliations

  • Scott Spendolini

There are no affiliations available

Personalised recommendations