Abstract

Your demo application allows everyone to have complete access to every page, which is very unusual for a web application. This chapter examines the APEX facilities for restricting access. These facilities can be divided into authentication, which identifies the legal users, and authorization, which specifies what information each legal user is allowed to see. You will also consider the issue of how to protect the data from malicious users.

Keywords

Prefix 

Copyright information

© Edward Sciore 2015

Authors and Affiliations

  • Edward Sciore
    • 1
  1. 1.MAUSA

Personalised recommendations