Search This Blog

Showing posts with label Configure an Existing Authentication Scheme in Oracle APEX. Show all posts
Showing posts with label Configure an Existing Authentication Scheme in Oracle APEX. Show all posts

Tuesday, July 15, 2025

Configure an Existing Authentication Scheme in Oracle APEX

Introduction
Configuring an existing authentication scheme in Oracle APEX allows you to tailor the login experience and security behavior of your application without creating a new scheme from scratch. Whether you are adjusting settings for LDAP integration, social sign-in, or a custom scheme, proper configuration ensures smooth and secure user authentication aligned with your organization’s needs.

How to Configure an Existing Authentication Scheme in Oracle APEX

  1. Open Your Application
    Log in to Oracle APEX and open the application you want to configure.

  2. Navigate to Authentication Schemes
    From the application home, go to Shared Components and select Authentication Schemes under the Security section.

  3. Select the Current Authentication Scheme
    Identify the scheme marked as (Current)—this is the active authentication method. Click its name to open its settings.

  4. Modify Scheme Settings
    Depending on the scheme type, you can adjust various properties:

    • Scheme Name: Rename if needed for clarity.

    • Scheme Type: View, but this cannot be changed for existing schemes.

    • Authentication Function or Process: For custom schemes, update the PL/SQL validation code.

    • Login Processing: Configure login page, post-login redirects, and error handling.

    • Logout Behavior: Set post-logout redirects and session cleanup.

    • Session Timeout: Define session expiration rules to improve security.

    • Social Sign-In Settings: Update OAuth credentials if using social providers.

    • LDAP Settings: Change server details, port, or base DN for LDAP authentication.

  5. Save and Test Changes
    After making the necessary adjustments, save your changes and test the login process thoroughly to ensure users can authenticate successfully.

After creating an authentication scheme in Oracle APEX, you may need to modify its settings to adjust authentication behavior, session management, and custom logic. You can configure various settings and program hooks to customize the login and logout processes.

Steps to Configure an Existing Authentication Scheme

  1. Access the Authentication Scheme

    • Log in to your Oracle APEX workspace.

    • Click on App Builder and select the application you want to modify.

    • Click on Shared Components in the application menu.

    • Under Security, click Authentication Schemes to view all available authentication schemes.

  2. Select an Authentication Scheme

    • Locate the authentication scheme you want to modify.

    • Click on its name to open the Edit Authentication Scheme page.

  3. Modify Authentication Settings

    • Scheme Name: Update the name of the authentication scheme if needed.

    • Scheme Type: The authentication type cannot be changed directly. If you need a different authentication type, create a new scheme.

    • Authentication Function Name (for Custom Authentication): Modify the PL/SQL function that validates user credentials.

  4. Configure Session Management

    • Session Timeout: Set the timeout duration for user sessions.

    • Session Timeout URL: Define a URL where users will be redirected after session timeout.

    • Rejoin Sessions: Enable or disable users from automatically rejoining an existing session.

  5. Set Up Program Hooks

    • Post-Authentication Procedure: Define a PL/SQL procedure that runs after successful authentication (e.g., logging login attempts, setting user roles).

    • Post-Logout Procedure: Specify a procedure that executes when a user logs out (e.g., clearing session variables, redirecting to a different page).

  6. Control Public Access

    • Run on Public Pages: Choose whether authentication should be enforced on public pages.

    • If set to On, authentication will be checked even on pages marked as public.

  7. Apply and Test Changes

    • Click Apply Changes to save the modifications.

    • Run the application and test the authentication process to ensure the changes work correctly.

By configuring an existing authentication scheme, you can fine-tune access control, session handling, and authentication logic to meet your application's security requirements.

Best Practices

  • Always back up your authentication scheme before making significant changes.

  • Clearly document any configuration changes for future reference.

  • Test authentication flows in a development or staging environment before applying to production.

  • Use HTTPS to protect credentials during login.

  • Monitor login success and failure events for security auditing.

Oracle APEX Documentation
For comprehensive guidance on managing authentication schemes, visit:
https://docs.oracle.com/en/database/oracle/apex/23.2/aeapp/configuring-authentication-schemes.html

Conclusion
Configuring an existing authentication scheme in Oracle APEX helps you maintain control over user access while adapting to changing security requirements. By carefully adjusting scheme settings and following best practices, you can provide a secure and seamless login experience tailored to your application’s needs.

How Do I Make a Faceted Search Map Page in Oracle APEX

Combining faceted search with a map region in Oracle APEX enables users to filter data visually and spatially at the same time. This design ...