Useful SQL*Plus headers
Dino eats frog
Oracle with Active Record
When is he free?
Gentle dive into analytic functions
« PL/SQL grows a bit more
» First thoughts on ASP.NET
If you don’t trust your web server’s security (reveal-source-bugs for example), you might have a concern like "what if someone gets the Oracle connection and password from the code; and uses SQL*Plus to cause problems?" Oracle stored procedures can be used to beef up your site's security. Here’s how.
Let us assume you’ve a web application running on Oracle backend. I’m going to assume your application follows the classic two or three tier models where the web processing code does not happen within Oracle. You get the parameters from web, query database and write back to web.
In such a situation, you usually will end up making SQL query strings in your application and then run it. This will require the SELECT - and possibly - INSERT, UPDATE, DELETE permissions on the tables for the Oracle user used by the web application. What if you want this user to have no free-form data browsing (or modification) permission on the database? One situation is where you want to store sensitive information inside the database. Even if someone is able to figure out the web application's connection string - which is usually available in the code - and use SQL*Plus to login to the database, you don’t want that user to see sensitive data.
Obviously, this doesn’t bullet-proof your data. It just adds one layer of protection.
Excelent! thank you!
You have said that one might use the DBMS_OBFUSCATE. How is this used?