Skip to main content
Next section

Preface

Welcome to the Security Tutorial!

InterSystems security provides a simple, robust, flexible, and unified security architecture. This architecture provides all of the following benefits:

  • It offers a strong, consistent, and high performance security infrastructure for applications.

  • It meets certification standards.

  • It makes it easy for developers to build security features into applications.

  • It places a minimal burden on performance and operations.

  • It ensures that InterSystems IRIS can operate as part of a secure environment.

This tutorial consists of three independent parts which can be completed in any order.

  1. Read Authentication to learn about authentication in InterSystems security.

  2. Read Securing Applications to learn about application security in InterSystems security.

  3. Read Authorization to learn about authorization in InterSystems security.

Note:

For in-depth discussion of all aspects of InterSystems security, read the Security Administration Guide.

This tutorial assumes that you have installed InterSystems IRIS® data platform with minimal security.