Book Image

Oracle ADF 11gR2 Development Beginner's Guide

By : Vinod Thatheri Krishnan
Book Image

Oracle ADF 11gR2 Development Beginner's Guide

By: Vinod Thatheri Krishnan

Overview of this book

Oracle ADF is an end-to-end framework which makes application development simple by providing infrastructure services as well as visual and declarative development right away. "Oracle ADF 11gR2 Development Beginner's Guide" guides any user with programming skills to be able to quickly learn the options and ways to develop rich Internet applications using ADF 11gR2. Containing all the skills that a new user has to use to build an application in ADF 11gR2, this book is designed in such a way so that it enhances the practical feel of developing applications in ADF 11gR2. Starting with the installation and configuration of Oracle ADF 11g RD we will then work through topics such as working with the Model Layer and Model Data followed by displaying and binding the data. Later we will look at Navigations and Flows within applications as well as their layout, look, and feel. "Oracle ADF 11g R2 Development Beginner's Guide" will conclude with us looking at the security and deployment of the applications which have been created.
Table of Contents (19 chapters)
Oracle ADF 11gR2 Development Beginner's Guide
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Pop Quiz Answers
Index

Time for action – disabling security for ADF applications


Now let's disable ADF security by using the following steps:

  1. Right-click on EmpDirectoryApplication and select the Secure option or select the Secure option from the Application menu.

  2. Select Configure ADF Security from the submenu.

  3. Select Remove ADF Security Configurations and click on the Next button.

  4. Click on the Finish button to remove security from the application.

What just happened?

We just removed security from EmpDirectoryApplication. All the entries related to security in the web.xml, jazn-data.xml, and jps-config.xml files will be removed. You can reapply security to the application by following the steps described earlier in this chapter.

Pop quiz

Q1. ADF security is configured by _______________.

  1. writing code

  2. using a configuration wizard

  3. a declarative way

  4. All of the above

  5. None of the above

Q2. A single user can have different roles.

  1. True

  2. False

Q3. The _______________ file is important in defining the security roles for the user in ADF...