Managing secure access to Web pages and applications is a common problem. You want to enable those you trust to access data while preventing unauthorized ones from gaining access to it. In most cases, database-based authentication is the solution.
Authentication systems contain an Access Control List (ACL) that lists your user credentials and matches them to your assigned system privileges. Credentials are typically a user name and password pair. Credentials link your users to system privileges. System privileges let your accounts access or modify data, and enable your accounts to execute subsystems or subroutines. Your accounts can be users, groups, or systems.
In this article, you will learn how to implement this concept in PHP-based Web applications. You will learn how to design and implement an authentication database model, and plan and manage all aspects of user interactions in a browser-hosted application.
The article continues at http://www.oracle.com/technology/pub/articles/mclaughlin-phpid1.html?rssid=rss_otn_articles