Search This Blog

Tuesday, July 15, 2025

Understanding Preconfigured Authentication Schemes in Oracle APEX

Introduction
Oracle APEX offers a variety of preconfigured authentication schemes to help developers quickly secure their applications. These built-in schemes provide ready-to-use options for common authentication needs, such as workspace accounts, LDAP, social sign-in, and single sign-on (SSO). Understanding these preconfigured schemes enables you to select the most appropriate authentication method for your application, ensuring security and ease of use.

Understanding Preconfigured Authentication Schemes in Oracle APEX

  1. Access Authentication Schemes

    • Open your application in Oracle APEX.

    • Navigate to Shared Components > Authentication Schemes.

    • Review the list of available preconfigured schemes.

  2. Types of Preconfigured Authentication Schemes

    • APEX Accounts: Uses workspace user accounts. Suitable for development and simple applications.

    • Database Accounts: Authenticates users with Oracle database credentials. Less common for web apps.

    • LDAP Directory: Integrates with corporate LDAP or Active Directory for enterprise authentication.

    • Social Sign-In: Supports OAuth 2.0 providers like Google, Facebook, or Microsoft for easy user login.

    • Oracle Single Sign-On (SSO): Connects to Oracle Identity Cloud Service or Oracle Access Manager for seamless enterprise authentication.

    • Open Door Credentials: No authentication required, for public-facing apps.

  3. How to Use Preconfigured Schemes

    • Select a scheme and review its default settings.

    • Customize configuration details as needed, such as LDAP server info or OAuth client IDs.

    • Activate the scheme by making it the current authentication method.

  4. Benefits of Using Preconfigured Schemes

    • Quick setup with minimal coding required.

    • Supported and maintained by Oracle, ensuring compatibility and security updates.

    • Easy integration with popular authentication providers and enterprise systems.

Oracle APEX provides several preconfigured authentication schemes that simplify user authentication and session management. These authentication schemes allow developers to quickly implement secure user authentication without writing complex authentication logic.


What Are Preconfigured Authentication Schemes?

Preconfigured authentication schemes are built-in authentication methods that Oracle APEX provides by default. They follow standard authentication and session management practices, making it easier to enforce security and control user access.

When creating an authentication scheme from the Authentication Scheme Gallery, you can choose from a list of predefined authentication schemes that handle different authentication methods, including database accounts, LDAP, social sign-in, and more.


Types of Preconfigured Authentication Schemes

1. Builder Extension Sign-in

  • Allows users to log into an Extension App without signing in again if they have an active APEX session.

  • Checks for an existing APEX session and grants access accordingly.

2. Custom Authentication

  • Enables developers to create a fully customized authentication process.

  • Typically implemented using PL/SQL functions to verify user credentials against a custom user repository.

3. Database Accounts

  • Uses Oracle database user accounts for authentication.

  • Users log in with their database schema credentials.

4. HTTP Header Variable

  • Authenticates users externally using an HTTP header variable.

  • The web server must be configured to set the username in an HTTP header.

5. LDAP Directory

  • Authenticates users against an LDAP server.

  • Requires LDAP configuration details such as server address, port, and search filters.

6. No Authentication (Using DAD)

  • Uses the current database user as the authenticated user.

  • Works with mod_plsql Database Access Descriptor (DAD) for authentication.

7. Open Door Credentials

  • Allows anyone to access the application.

  • Provides a basic login page where users can enter any username.

8. Oracle APEX Accounts

  • Uses APEX workspace user accounts for authentication.

  • Users must be registered in APEX’s internal user repository.

9. Oracle Application Server Single Sign-On (SSO)

  • Delegates authentication to Oracle Application Server SSO.

  • Requires registering the application with the SSO server.

10. SAML Sign-In

  • Uses Security Assertion Markup Language (SAML) for authentication.

  • Commonly used in enterprise applications for federated authentication.

11. Social Sign-In

  • Allows users to log in using Google, Facebook, Microsoft, or other social providers.

  • Supports authentication via OpenID Connect or OAuth2.


Choosing the Right Authentication Scheme

  • For internal applications using APEX accounts → Use Oracle APEX Accounts.

  • For database security where users have individual accounts → Use Database Accounts.

  • For enterprise authentication with an existing user directory → Use LDAP or SAML Sign-In.

  • For public applications without user restrictions → Use Open Door Credentials or No Authentication.

  • For single sign-on (SSO) in Oracle environments → Use Oracle Application Server SSO.

  • For external authentication via social providers → Use Social Sign-In.

  • For applications behind a proxy or load balancer → Use HTTP Header Variable authentication.

Implementing a Preconfigured Authentication Scheme

1. Navigate to Authentication Schemes

  • Open App Builder and select your application.

  • Click Shared Components > Authentication Schemes.

2. Create a New Authentication Scheme

  • Click Create.

  • Select Based on a preconfigured scheme from the gallery.

  • Choose the authentication scheme that fits your requirements.

3. Configure Authentication Settings

  • Provide necessary credentials, server details, or API configurations.

  • Define post-authentication and post-logout procedures, if needed.

4. Activate the Authentication Scheme

  • Click Make Current to set the new authentication scheme as active.


Preconfigured authentication schemes in Oracle APEX provide a quick and secure way to implement authentication. They cover a variety of use cases, from database authentication to enterprise SSO and social login. By selecting the appropriate authentication method, developers can ensure their applications meet security and usability requirements.

Best Practices

  • Choose the authentication scheme that best fits your user base and security requirements.

  • Test your chosen scheme thoroughly in development before deploying.

  • Keep authentication credentials and secrets secure and up to date.

  • Document your authentication choices and configurations for maintenance and auditing.

  • Avoid using Open Door Credentials for sensitive applications.

Oracle APEX Documentation
For detailed information, visit:
https://docs.oracle.com/en/database/oracle/apex/23.2/aeapp/preconfigured-authentication-schemes.html

Conclusion
Understanding preconfigured authentication schemes in Oracle APEX helps you quickly implement secure login mechanisms tailored to your application's needs. By leveraging these built-in options, you can reduce development time and ensure your application aligns with best security practices. Proper selection and configuration of these schemes contribute to a safe and user-friendly experience.

Build Extension Sign-in in Oracle APEX

 Introduction

Building an extension sign-in in Oracle APEX allows you to integrate external authentication mechanisms or custom login flows into your APEX applications. This is especially useful when you want to support third-party identity providers or implement specialized security policies. Extension sign-in provides a flexible way to enhance the default APEX authentication capabilities while maintaining a seamless user experience.

How to Build Extension Sign-in in Oracle APEX

  1. Understand Extension Sign-in Concept
    Extension sign-in means creating a custom authentication process that hooks into the APEX login framework but can interact with external systems or custom logic.

  2. Create a Custom Authentication Scheme

    • In your APEX application, navigate to Shared Components > Authentication Schemes.

    • Click Create, then select Custom authentication scheme.

    • Define your authentication PL/SQL function that calls your external sign-in logic or verifies credentials against an external system.

  3. Implement the Authentication Logic

    • Develop a PL/SQL function that validates user credentials or tokens by communicating with your external system, such as OAuth providers, REST APIs, or SAML services.

    • The function should return TRUE for successful authentication and FALSE otherwise.

  4. Handle Redirects and Sessions

    • Configure post-login and post-logout redirects to integrate smoothly with the extension sign-in flow.

    • Manage user session initialization in APEX using appropriate procedures after successful external authentication.

  5. Test the Extension Sign-in Process

    • Thoroughly test login scenarios, including error handling, token expiration, and logout behavior to ensure a seamless user experience.

The Builder Extension Sign-in authentication scheme in Oracle APEX allows users to log in to an Extension App without requiring a separate authentication process if they are already signed into an APEX session. This authentication scheme checks for an active APEX session and grants access based on the existing session credentials.


How Builder Extension Sign-in Works

  • This authentication scheme relies on the existing APEX session to validate users.

  • Users who are already logged into Oracle APEX can access the extension application without needing to re-enter credentials.

  • If a valid session is not found, the user is redirected to the APEX login page.

Steps to Use Builder Extension Sign-in

1. Navigate to Authentication Schemes

  • Open App Builder and select your application.

  • Click Shared Components > Authentication Schemes.

2. Create a New Authentication Scheme

  • Click Create to add a new authentication scheme.

  • Select Based on a preconfigured scheme from the gallery.

  • Choose Builder Extension Sign-in from the list of authentication schemes.

3. Configure Authentication Settings

  • Set the scheme Name (e.g., "Extension App Sign-in").

  • Configure Session Timeout settings to ensure session security.

  • Optionally, define Post-Authentication Procedures for additional validation.

  • Click Create Authentication Scheme.

4. Activate the Authentication Scheme

  • Once created, the scheme is not active by default.

  • Click Make Current to set it as the active authentication scheme for the application.

Use Cases for Builder Extension Sign-in

  • Seamless access to custom APEX extensions without requiring users to log in again.

  • Simplified user experience for APEX-based tools, dashboards, and utilities.

  • Improved security by leveraging APEX session management instead of custom authentication methods.

By using the Builder Extension Sign-in authentication scheme, APEX developers can ensure a smooth and secure login experience for extension applications within their workspace.

Best Practices

  • Securely handle sensitive information and tokens when integrating with external systems.

  • Keep authentication logic modular and reusable across applications.

  • Use HTTPS to protect all communication with external identity providers.

  • Document your extension sign-in flow for maintenance and audits.

  • Regularly update your integration to comply with security standards and protocols.

Oracle APEX Documentation
For more detailed guidance, visit:
https://docs.oracle.com/en/database/oracle/apex/23.2/aeapp/custom-authentication-schemes.html

Conclusion
Building an extension sign-in in Oracle APEX empowers you to incorporate external or custom authentication processes into your applications. By carefully designing and implementing a custom authentication scheme, you can provide users with secure and flexible sign-in options that meet your organization’s unique requirements. Following best practices ensures that your integration is robust, secure, and maintainable.

View Authentication Scheme Reports in Oracle APEX

Introduction
In Oracle APEX, managing authentication schemes across applications is essential for maintaining secure user access. Authentication scheme reports provide valuable insights into the schemes used, their configurations, and usage statistics. Viewing these reports helps developers and administrators monitor security settings, troubleshoot login issues, and ensure consistent authentication practices.

How to View Authentication Scheme Reports in Oracle APEX

  1. Access Your Workspace Administration
    Log in to Oracle APEX as a workspace administrator.

  2. Navigate to the Reports Section

    • From the workspace home, go to App Builder.

    • Click on Workspace Utilities or directly access Manage Authentication Schemes depending on your APEX version.

  3. Locate Authentication Scheme Reports
    Oracle APEX provides views and reports that list authentication schemes used by applications within the workspace.

    • You can find reports that show scheme names, types, last modified dates, and which applications use them.

    • For detailed data, use the data dictionary views such as APEX_APPLICATION_AUTHENTICATION and related views in SQL Workshop.

  4. Using SQL Workshop for Custom Reports

    • Navigate to SQL Workshop > SQL Commands or SQL Scripts.

    • Run queries on authentication scheme metadata, for example:

      SELECT application_id, authentication_scheme, last_updated 
      FROM apex_application_authentication 
      ORDER BY application_id;
      
    • Customize queries to gather relevant information such as scheme usage and configuration.

  5. Interpreting the Reports
    Use the report data to:

    • Identify which authentication schemes are active in each application.

    • Track changes over time.

    • Audit security configurations across your workspace.

Oracle APEX provides built-in reports that allow developers to view and manage authentication schemes within an application. These reports help track the current authentication scheme, review available authentication methods, and monitor subscription statuses for authentication schemes copied from other applications.


Steps to View Authentication Scheme Reports

1. Navigate to the Authentication Schemes Page

  • Log in to Oracle APEX.

  • Open App Builder and select the application you want to inspect.

  • Click Shared Components > Authentication Schemes.

2. Review the Authentication Scheme Report

On the Authentication Schemes page, a report displays the following key details for each authentication scheme:

  • Scheme Name – The name of the authentication scheme.

  • Scheme Type – The type of authentication used (e.g., APEX Accounts, LDAP, Social Sign-In, etc.).

  • Current Scheme – Indicates which authentication scheme is active for the application.

  • Subscribed From – Shows if the authentication scheme is subscribed from another application.

  • Subscription Status – Displays whether the authentication scheme is up to date or requires synchronization with its master.

3. Filter or Search for Specific Authentication Schemes

Use the Search bar or filtering options to find a specific authentication scheme based on:

  • Scheme Type (e.g., LDAP, Database Accounts, OAuth2).

  • Subscription Status (Subscribed, Unsubscribed).

  • Active/Inactive Schemes.

4. View Detailed Information for a Specific Authentication Scheme

  • Click on an authentication scheme name to open its Edit page.

  • Review or modify attributes, including session management settings, authentication process hooks, and login page configurations.


Use Cases for Viewing Authentication Scheme Reports

  • Identifying which authentication scheme is currently active in the application.

  • Monitoring authentication scheme subscriptions and ensuring they are synchronized with their master definitions.

  • Verifying authentication security settings to comply with organizational policies.

  • Troubleshooting authentication-related issues by reviewing session settings and authentication behavior.

By leveraging authentication scheme reports, Oracle APEX developers can efficiently manage and monitor authentication settings within their applications.

Best Practices

  • Regularly review authentication scheme reports to ensure all applications comply with your organization’s security standards.

  • Use custom SQL reports to tailor information to your specific monitoring needs.

  • Combine authentication reports with user access and authorization reviews for comprehensive security audits.

  • Document findings and maintain version control of your authentication schemes.

Oracle APEX Documentation
For more details, see the official Oracle APEX documentation on authentication management and reporting:
https://docs.oracle.com/en/database/oracle/apex/23.2/aeapp/managing-authentication-schemes.html

Conclusion
Viewing authentication scheme reports in Oracle APEX is a valuable practice for maintaining secure and well-managed applications. These reports provide visibility into how users are authenticated and help administrators detect potential security gaps. By leveraging built-in and custom reporting tools, you can keep your authentication environment transparent, consistent, and aligned with best security practices.