Rather than a one-size fits all solution - trying to handle everything through a Virtual Private Database policy - a proper security plan involves the use of a variety of techniques, each with their own place in the model. #oracle #vpd #security #roles #plsql #privileges #constraints
PL/SQL
How To Do It In Parallel
I just came across an interesting question on the Stack Exchange forum, where a user was asking how to execute a set of PL/SQL procedures in parallel with each other. There really isn't a construct in PL/SQL to accomplish this. That is not to say that it can't be done, however...
Well That’s Random…
Increasingly we are asked to provide more secure passwords for accounts of all kinds. As I have written previously, because coming up with new ones that meet all complexity requirements can be a real pain, I try to avoid passwords whenever possible in favor of PKE authentication. Sometimes, however, they are unavoidable.
code-obfuscation-toolkit
The code-obfuscation-toolkit allows you to obfuscate the source code of a variety of stored programs, including procedures, functions, package bodies, and type bodies. When wrapping an object, to further obfuscate the original code in the event that it is ever unwrapped, all comments and line breaks can also be removed.
Database Independence is a Myth
One thing that going over this material again and again over the last few weeks has driven home for me, especially as our customer considers how best to implement their various choices for development frameworks, is just how much of a fairy tale the promises of middle-tier application servers turned out out to be in terms of processing business logic.
Automatically Protecting PII Data Columns with Transparent Data Encryption
What if you have a lot of potential PII data and you need to enforce some additional safeguards on it? How do I make this information actionable, and better yet how do IÂ automate that action as much as possible?
AQ Basics
A co-worker of mine recently had a dilemma. He needed to have a scheduler job chain in one schema trigger a second scheduler job chain in another schema when it completed. He had already come up with some ideas on how to accomplish this with a variety of home-grown solutions and he wanted to run … Continue reading AQ Basics
whitelist-for-oracle
A filter that allows incoming database connections to be approved or rejected based on the values of their sys_context parameters.