Skip to main content

Authorization Basics

This section of the tutorial provides an introduction to authorization using InterSystems security. After completing this part of the tutorial, you will be able to:

  • List the different types of database assets protected by the InterSystems security system.

  • Create users, roles, and privileges.

  • Grant privileges to users by assigning them to roles.

  • Use the $SYSTEM.Security.Check method to protect code blocks from unauthorized access.

Note:

For in-depth discussion of authorization using InterSystems security, see About InterSystems Authorization. See also Using Resources to Protect Assets, Privileges and Permissions, Roles, Users, and Services.

FeedbackOpens in a new tab