21.5.2 About Authorization Scheme Types
Select an authorization scheme type when you create an authorization scheme.
The authorization scheme type determines how an authorization scheme is applied. Developers can create new authorization type plug-ins to extend this list.
Authorization Scheme Types | Description |
---|---|
Exists SQL Query | Enter a query that causes the authorization scheme to pass if it returns at least one row and causes the scheme to fail if it returns no rows |
NOT Exists SQL Query | Enter a query that causes the authorization scheme to pass if it returns no rows and causes the scheme to fail if it returns one or more rows |
PL/SQL Function Returning Boolean | Enter a function body. If the function returns true, the authorization succeeds. |
Item in Expression 1 is NULL | Enter an item name. If the item is null, the authorization succeeds. |
Item in Expression 1 is NOT NULL | Enter an item name. If the item is not null, the authorization succeeds. |
Value of Item in Expression 1 Equals Expression 2 | Enter and item name and value. The authorization succeeds if the item's value equals the authorization value. |
Value of Item in Expression 1 Does NOT Equal Expression 2 | Enter an item name and a value. The authorization succeeds if the item's value is not equal to the authorization value. |
Value of Preference in Expression 1 Does NOT Equal Expression 2 | Enter an preference name and a value. The authorization succeeds if the preference's value is not equal to the authorization value. |
Value of Preference in Expression 1 Equals Expression 2 | Enter an preference name and a value. The authorization succeeds if the preference's value equal the authorization value. |
Is In Group |
Enter a group name. The authorization succeeds if the group is enabled as a dynamic group for the session. See APEX_AUTHORIZATION.ENABLE_DYNAMIC_GROUPS in Oracle APEX API Reference. If the application uses APEX Accounts Authentication, this check also includes workspace groups that are granted to the user. If the application uses Database Authentication, this check also includes database roles that are granted to the user. |
Is Not In Group | Enter a group name. The authorization succeeds if the group is not enabled as a dynamic group for the session. |
Parent topic: Providing Security Through Authorization