Skip to main content
Next section

About This Book

This book describes the functionality for securing InterSystems IRIS® data platform applications and deployed instances.

This book covers the following fundamental topics:

  • About InterSystems Security” provides an overview of the available security features.

  • Authentication” explains the theory and practice of configuring InterSystems IRIS to authenticate its users.

  • Assets and Resources” begins the authorization chapters by describing the data and activities InterSystems IRIS protects — called assets — and how they are represented within InterSystems IRIS — as what are called “resources.”

  • Privileges and Permissions” continues the authorization chapters by describing the mechanism for granting access to those resources.

  • Roles” continues the authorization chapters by describing how privileges are aggregated into the logical form called “roles” and how users can be associated with roles.

  • Users” continues the authorization chapters by describing the representation of those entities — called “users” — within InterSystems IRIS.

  • Services” continues the authorization chapters by describing how InterSystems IRIS protects the various means by which users and programs can connect to it, which are called “services.”

  • Applications” concludes the authorization chapters by describing how to create and use application-based security with InterSystems IRIS

  • Auditing” describes how to configure InterSystems IRIS to log various activities.

  • Managed Key Encryption” explains how to encrypt data on disk.

This book’s advanced topics are:

The book’s appendices are:

For a detailed outline, see the Table of Contents.

Other related topics in the documentation set are: