096 - Chapter 11. Developing a Sample Audit Application


Oracle Security
By William Heney, Marlene Theriault
Table of Contents
Part II:  Implementing Security

Chapter 11. Developing a Sample Audit Application

In business, you sometimes need to maintain detailed records about people, places, and things. You may feel that the information you are maintaining is so important to your company that more detailed data is needed to track:

  • Who created the information

  • Who has modified the information

  • What was changed

As you saw in Chapter 10, Oracle provides ways to track information about modifications that have been made to a table at the table level. However, Oracle does not provide an easy way to keep track of actions that have been performed on specific rows within a table. For that information, you need to develop a customized application.

In this chapter, we will show you a simple, but effective, application [1] you can use for implementing transparent audit trails. Depending on how much auditing you implement, this application may not overly impact your database's performance, and it does not require a lot of complex maintenance. This sample trigger-based application can give you an idea of how you can implement your own audit trail application, or you can use this application either in part or as a complete application to perform whatever auditing you need.

[1] Our thanks to Christopher Hamilton for developing the code and parts of the text included in this chapter.


Oracle Security
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
ISBN: 0072133252
EAN: 2147483647
Year: 1998
Pages: 154

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net