>APEX Authentication and Authorisation for Forms Developers

APEX Authentication and Authorisation for Forms Developers In this video I explain the many Authentication schemes of Oracle APEX as compared to the few available in Oracle Forms. APEX includes all the Authentication Schemes which Oracle Forms has including a flexible scheme which provides the ability for the developer to create their own custom scheme. […]

>> Read More

Blog, Explorer, Security / authorisation, Vulnerabilities / April 19, 2016

>Securing Vulnerability Exploits with Apex – Part 3

Securing Vulnerability Exploits with Apex – Part 3 For my final security blog I will be looking at SQL injection and cross site scripting, both of which should always be considered when developing a web based application. Apex has in-built functionality to prevent these attacks and the following best practices will allow you to fully […]

>> Read More

Explorer, How to, Security / APEX 5.0, Security, Vulnerabilities / December 22, 2014

>Securing Vulnerability Exploits with Apex – Part 2

Securing Vulnerability Exploits with Apex – Part 2 Following on from my last blog, which focused on configuring access control within Apex, the focus of this blog is protecting the session state within an application. We will look at the common issues faced by developers and the tools available within Apex to protect your application. […]

>> Read More

Explorer, How to, Security / APEX 5.0, Security, Vulnerabilities / December 8, 2014

>APEX Security Considerations – Part 1

APEX Security Considerations – Part 1 Whenever you are developing a web based application, there are many security concerns that need to be considered. When developing using Oracle Apex, there are a number of in-built security features available to enhance Access Control and Session State Protection, and to also prevent SQL Injection and Cross Site […]

>> Read More

Explorer, How to, Security / APEX 5.0, Database, Security / November 25, 2014