Skip to main content

This is documentation for Caché & Ensemble.

For information on converting to InterSystems IRIS, see the InterSystems IRIS Adoption Guide and the InterSystems IRIS In-Place Conversion Guide, both available on the WRC Distributions page (login required).

Previous sectionNext section


This section of the tutorial provides an introduction to authentication using Caché security. After completing this part of the tutorial, you will be able to:

  • List the authentication mechanisms supported by Caché.

  • Describe the roles of Connection Tools and Caché Services in Caché authentication.

  • List the different Caché Access Modes and map each Connection Tool to its access mode.

  • Differentiate the three different types of Caché user accounts.

  • List the different predefined Caché user accounts along with their user names and passwords.

  • Describe Caché support for Kerberos, LDAP, and Operating System based authentication.

  • Implement Caché Login, Unauthenticated, Delegated, and Cascading authentication.


For in-depth discussion of Authentication in Caché security, read Authentication in the Caché Security Administration Guide.


Click here to begin.