Skip to main content

This is documentation for Caché & Ensemble.

For information on converting to InterSystems IRISOpens in a new window, see the InterSystems IRIS Migration Guide and Migrating to InterSystems IRIS, both available on the WRC Distributions pageOpens in a new window (login required).

Recap

In the Authorization section of this tutorial you have learned about the following:

  • The different types of database assets protected by the Caché security system.

  • Using Caché security resources to protect database assets .

  • Using Caché's role-based security system to assign privileges to users.

  • Using the $SYSTEM.Security.Check method to protect code blocks from unauthorized access.

Note:

Click here to return to the Preface.

Click here to return to Part I (Authentication).

Click here to return to Part II (Authorization).

Click here to continue with Part III (Applications).

FeedbackOpens in a new window