Skip to main content


In the Authorization section of this tutorial you have learned about the following:

  • The different types of database assets protected by the Caché security system.

  • Using Caché security resources to protect database assets .

  • Using Caché's role-based security system to assign privileges to users.

  • Using the $SYSTEM.Security.Check method to protect code blocks from unauthorized access.


Click here to return to the Preface.

Click here to return to Part I (Authentication).

Click here to return to Part II (Authorization).

Click here to continue with Part III (Applications).

FeedbackOpens in a new tab