Database Reference
In-Depth Information
block [E1] in Figure 9-1. In that block, we see an illustration of the process used to distribute the two-
factor code to the individual devices associated with the user.
The second time we call p_check_hrview_access , we provide the two-factor authentication code as
an argument. Because we have returned with that code, we perform the process depicted in block [E2] of
Figure 9-1. It is there that we see the tests for validity of the two-factor code, and if all is well, the SET
ROLE command to acquire the hrview_role .
With that role, our user can continue on to select and update sensitive data in the HR schema using
encryption. Those processes are included in Figure 9-1 by a reference to Figures 7-1 and 7-2.
Figure 9-1. The two-factor authentication code process
 
Search WWH ::




Custom Search