Skip to main content


In the Authorization section of this tutorial you have learned about the following:

  • The different types of database assets protected by the InterSystems security system.

  • Using InterSystems security resources to protect database assets .

  • Using InterSystems IRIS's role-based security system to assign privileges to users.

  • Using the $SYSTEM.Security.Check method to protect code blocks from unauthorized access.

FeedbackOpens in a new tab