Skip to main content

This is documentation for Caché & Ensemble.

For information on converting to InterSystems IRIS, see the InterSystems IRIS Adoption Guide and the InterSystems IRIS In-Place Conversion Guide, both available on the WRC Distributions page (login required).

Next section

About This Book

This book describes the functionality for securing Caché applications and deployed instances.

This book covers the following fundamental topics:

  • About Caché Security” provides an overview of the available security features.

  • Authentication” explains the theory and practice of configuring Caché to authenticate its users.

  • Assets and Resources” begins the authorization chapters by describing the data and activities Caché protects — called assets — and how they are represented within Caché — as what are called “resources.”

  • Privileges and Permissions” continues the authorization chapters by describing the mechanism for granting access to those resources.

  • Roles” continues the authorization chapters by describing how privileges are aggregated into the logical form called “roles” and how users can be associated with roles.

  • Users” continues the authorization chapters by describing the representation of those entities — called “users” — within Caché.

  • Services” continues the authorization chapters by describing how Caché protects the various means by which users and programs can connect to it, which are called “services.”

  • Applications” concludes the authorization chapters by describing how to create and use application-based security with Caché

  • Auditing” describes how to configure Caché to log various activities.

  • Managed Key Encryption” explains how to encrypt data on disk.

This book’s advanced topics are:

The book’s appendices are:

For a detailed outline, see the Table of Contents.

Other related topics in the Caché documentation set are:

  • The Caché Installation Guide, the “Preparing for Caché Security” appendix provides preliminary setup information for an instance that will use security.

  • Using Caché Server Pages (CSP), the “CSP Architecture” chapter describes how to configure CSP applications, including security-related properties.

  • Using Caché SQL, the Users, Roles, and Privileges chapter provides the SQL perspective on Caché security.

For general information, see Using InterSystems Documentation.

FeedbackOpens in a new window