Database Reference
In-Depth Information
block
[E1]
in Figure 9-1. In that block, we see an illustration of the process used to distribute the two-
factor code to the individual devices associated with the user.
The second time we call
p_check_hrview_access
, we provide the two-factor authentication code as
an argument. Because we have returned with that code, we perform the process depicted in block
[E2]
of
Figure 9-1. It is there that we see the tests for validity of the two-factor code, and if all is well, the
SET
ROLE
command to acquire the
hrview_role
.
With that role, our user can continue on to select and update sensitive data in the HR schema using
encryption. Those processes are included in Figure 9-1 by a reference to Figures 7-1 and 7-2.
Figure 9-1.
The two-factor authentication code process