Skip to main content

This is documentation for Caché & Ensemble.

For information on converting to InterSystems IRIS, see the InterSystems IRIS Adoption Guide and the InterSystems IRIS In-Place Conversion Guide, both available on the WRC Distributions page (login required).

Previous sectionNext section


Control what each user is permitted to use, view, or alter.

Background Information

Authorization is the process of controlling what each user can use, view, or alter in the application.

Available Tools

Role-based authorization model

InterSystems uses a role-based authorization model; roles carry permissions, and users are assigned to roles. A user then has the cumulative permissions provided by all the roles to which the user belongs.

As a programmer, you are responsible for including the appropriate security checks within your code to make sure that a given user has permission to perform a given task. You can also temporarily give a user permissions for a specific task, using an option called role escalation.

For information, see the Caché Security Administration Guide. Also see the Caché Security Tutorial.

Availability: All namespaces.

FeedbackOpens in a new window