About This Book
This book describes the functionality for securing Caché applications and deployed instances.
This book covers the following fundamental topics:
-
“About Caché Security” provides an overview of the available security features.
-
“Authentication” explains the theory and practice of configuring Caché to authenticate its users.
-
“Assets and Resources” begins the authorization chapters by describing the data and activities Caché protects — called assets — and how they are represented within Caché — as what are called “resources.”
-
“Privileges and Permissions” continues the authorization chapters by describing the mechanism for granting access to those resources.
-
“Roles” continues the authorization chapters by describing how privileges are aggregated into the logical form called “roles” and how users can be associated with roles.
-
“Users” continues the authorization chapters by describing the representation of those entities — called “users” — within Caché.
-
“Services” continues the authorization chapters by describing how Caché protects the various means by which users and programs can connect to it, which are called “services.”
-
“Applications” concludes the authorization chapters by describing how to create and use application-based security with Caché
-
“Auditing” describes how to configure Caché to log various activities.
-
“Managed Key Encryption” explains how to encrypt data on disk.
This book’s advanced topics are:
The book’s appendices are:
For a detailed outline, see the Table of Contents.
Other related topics in the Caché documentation set are:
-
The Caché Installation Guide, the “Preparing for Caché Security” appendix provides preliminary setup information for an instance that will use security.
-
Using Caché Server Pages (CSP), the “CSP Architecture” chapter describes how to configure CSP applications, including security-related properties.
-
Using Caché SQL, the Users, Roles, and Privileges chapter provides the SQL perspective on Caché security.
For general information, see Using InterSystems Documentation.