Book Image

Oracle APEX Best Practices

Book Image

Oracle APEX Best Practices

Overview of this book

Have you ever wanted to create real-world database applications? In this book you're not only getting APEX best practices, but will also take into account the total environment of an APEX application and benefit from it."Oracle APEX Best Practices" will guide you through the development of real-world applications. It will give you a broader view of APEX. The various aspects include setting up APEX environment, testing and debugging, security, and getting the best out of SQL and PL/SQL.In six distinct chapters you will learn about different features of Oracle APEX as well as SQL and PL/SQL.Do you maximize the capabilities of Oracle APEX? Do you use all the power that SQL and PL/SQL have to offer? Do you want to learn how to build a secure, fully functional application? Then this is the book you'll need. "Oracle APEX: Best Practices" is where practical development begins!
Table of Contents (14 chapters)
Oracle APEX Best Practices
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Virtual Private Database


A very powerful feature of the Oracle database is Virtual Private Database (VPD). This feature is only available with the Enterprise edition. Virtual Private Database, also known as Row Level Security or Fine Grained Access Control, is a very popular choice of security when the standard object privileges and database roles are not sufficient. With VPD, you can specify which part (rows and/or columns) are accessible to the user. The policies that you specify can be as simple or complex as required.

VPD policies are defined against the database tables and are enforced whenever the table is accessed, regardless of the user interface that is being used. When the data is accessed through APEX or SQL*Plus, the same VPD policies are enforced and only the data is accessible, which is allowed by the policy.

When you define a VPD policy on a database table, a predicate is added whenever the table is accessed. With the VPD policy, you can define when the predicate is applied...