Book Image

Oracle ADF 11gR2 Development Beginner's Guide

By : Vinod Thatheri Krishnan
Book Image

Oracle ADF 11gR2 Development Beginner's Guide

By: Vinod Thatheri Krishnan

Overview of this book

Oracle ADF is an end-to-end framework which makes application development simple by providing infrastructure services as well as visual and declarative development right away. "Oracle ADF 11gR2 Development Beginner's Guide" guides any user with programming skills to be able to quickly learn the options and ways to develop rich Internet applications using ADF 11gR2. Containing all the skills that a new user has to use to build an application in ADF 11gR2, this book is designed in such a way so that it enhances the practical feel of developing applications in ADF 11gR2. Starting with the installation and configuration of Oracle ADF 11g RD we will then work through topics such as working with the Model Layer and Model Data followed by displaying and binding the data. Later we will look at Navigations and Flows within applications as well as their layout, look, and feel. "Oracle ADF 11g R2 Development Beginner's Guide" will conclude with us looking at the security and deployment of the applications which have been created.
Table of Contents (19 chapters)
Oracle ADF 11gR2 Development Beginner's Guide
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Pop Quiz Answers
Index

Introduction to security


The ADF security framework provides authentication and authorization for web applications. This security framework is built on top of Java Authentication and Authorization Services (JAAS). Security can be applied to objects, task flows, page fragments, and the page, by giving permissions and grants. The framework also supports the enforcing of policies and grants for the application to tighten security for the web application.

Basic security

Security using ADF is set up for the entire application and implementing it is in fact very easy. The ADF security wizard will be used to provide the security for the entire application. Later, the application can be tuned, and policies and grants can be introduced to increase the level of security for the application.