Skip to main content

Authorization

InterSystems IRIS® supports a robust role-based authorization system, which determines an authenticated user can create, use, view, change, or delete.

Get acquainted

video iconUsers and Roles in InterSystems IRIS

documentation iconAuthorization basics

Try it

interactive iconFirst Look: Role-based access control

Read all about it

documentation iconAuthorization: Controlling User Access

documentation iconAssets and resources

documentation iconPrivileges and permissions

documentation iconRoles

documentation iconUsers

documentation iconLDAP

External authorization systems

documentation icondelegated authorization (authorization only)

documentation icondelegated authentication (authorization and authentication)

Match authorization with authentication

You can use each authorization/role-assignment mechanism only with certain authentication mechanisms.

Authorization/role-assignment mechanism Authentication mechanism(s)
InterSystems authorization All authentication systems
Delegated authorization Delegated authentication
OS-based
Kerberos
LDAP LDAP
OS-based
Delegated authentication (can also perform authorization) Delegated authentication

Explore more

Navigation iconSQL security

Navigation iconSecurity

Navigation iconAuthentication