Security Structures for the HR User
Our working model of application encryption will consist of reading data from the HR
schema, with sensitive columns being encrypted as they are transmitted across the network. Part of the responsibility falls to the application developers who must assure that sensitive data is only available to the client in encrypted form. Our application security schema, appsec
, can provide the tools, but our application developers, like HR
, will need to implement them.
Let's explore what HR
does to encrypt his data first. Then We'll look at what the Application Security manager can provide to all application developers as a template for implementing this.
Exploring Privileges That Enable HR Tasks
HR
, as provided by Oracle, ...
Get Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.