About This Book
This book describes the functionality for securing InterSystems IRIS® data platform applications and deployed instances.
This book covers the following fundamental topics:
“About InterSystems Security” provides an overview of the available security features.
“Authentication” explains the theory and practice of configuring InterSystems IRIS to authenticate its users.
“Assets and Resources” begins the authorization chapters by describing the data and activities InterSystems IRIS protects — called assets — and how they are represented within InterSystems IRIS — as what are called “resources.”
“Privileges and Permissions” continues the authorization chapters by describing the mechanism for granting access to those resources.
“Roles” continues the authorization chapters by describing how privileges are aggregated into the logical form called “roles” and how users can be associated with roles.
“Users” continues the authorization chapters by describing the representation of those entities — called “users” — within InterSystems IRIS.
“Services” continues the authorization chapters by describing how InterSystems IRIS protects the various means by which users and programs can connect to it, which are called “services.”
“Applications” concludes the authorization chapters by describing how to create and use application-based security with InterSystems IRIS
“Auditing” describes how to configure InterSystems IRIS to log various activities.
“Managed Key Encryption” explains how to encrypt data on disk.
This book’s advanced topics are:
The book’s appendices are:
For a detailed outline, see the Table of Contents.
Other related topics in the documentation set are:
The InterSystems IRIS Installation Guide, the “Preparing for InterSystems Security” appendix provides preliminary setup information for an instance that will use security.
Using InterSystems SQL, the Users, Roles, and Privileges chapter provides the SQL perspective on InterSystems security.