Authorization Basics
This section of the tutorial provides an introduction to authorization using InterSystems security. After completing this part of the tutorial, you will be able to:
-
List the different types of database assets protected by the InterSystems security system.
-
Create users, roles, and privileges.
-
Grant privileges to users by assigning them to roles.
-
Use the $SYSTEM.Security.Check method to protect code blocks from unauthorized access.
Note:
For in-depth discussion of authorization using InterSystems security, see About InterSystems Authorization. See also Using Resources to Protect Assets, Privileges and Permissions, Roles, Users, and Services.