Databases Reference
In-Depth Information
although the USERS table contains a field named PASSWORD , it's not the actual password value; it's an encrypted
hash of the password. passwords should never be stored as plain text.
Note
Here's the process to follow to create a custom authentication scheme based on the database objects just
mentioned:
1.
Navigate to the Shared Components of the application.
2.
In the Security region, click Authentication Schemes as shown in Figure 9-19 .
Figure 9-19. Navigating to the Authentication Schemes shared component
3.
Click the Create button at the upper right on the Authentication Schemes screen.
4.
Select Based on a Pre-Configured Scheme from the Gallery , and click Next .
Enter Custom Authentication Scheme for Name , and then select Custom for Scheme
Type . The page refreshes and displays different entry options based on the scheme type
selected.
5.
In the Settings section, enter authenticate_user for Authentication Function Name ,
as shown in Figure 9-20 . You don't need to fill out any of the other items in this section.
6.
Figure 9-20. Setting the Authentication Function Name
7.
Click Create Authentication Scheme .
 
Search WWH ::




Custom Search