Security Tutorial Authentication Basics Authentication Mechanisms InterSystems Authentication Components and Process Connection Tools and Access Modes InterSystems Services Specifying Authentication Mechanisms Two-Factor Authentication Users Predefined Users Cascading Authentication Kerberos Authentication Operating System Based Authentication Instance Authentication Example One: %Service_Console Authentication Example One: Changing %Service_Console Authentication Mechanisms Example One: Using Cascading Authentication Example One: Enabling Two-Factor Authentication Example Two: Web Delegated Authentication Basics Delegated Authentication Setup ZAuthenticate LDAP Authentication LDAP Authentication Configuration Recap Authorization Basics Overview of the InterSystems Role-Based Authorization Model Assets and Resources Privileges Public Privileges Privileges, Roles, and Users Database Resources Namespaces Setup for Users, Resources, and Roles Examples Example One: %Developer and %Operator Roles Example Two: %Development Resource Example Three: %DB_USER Resource Example Four: $SYSTEM.Security.Check Recap Securing Applications Three Types of Application Definitions Properties of Application Definitions Web Application Definitions Setup for Web Application Authorization Example Example One: Disabling an Application Example Two: Protecting an Application with a Resource Example Three: Application Roles Example Four: Matching and Target Roles Privileged Routine Applications Setup for Privileged Routine Application Example Example: Creating a Privileged Routine Application Definition Example: Adding a Routine Example: Adding Application Roles Example: Executing the Privileged Routine Application Java, .NET, and Other Applications Recap Connection Tools, Access Modes, Services Code for Authorization Example Code for Authentication Example Code for Privileged Routine Example Creating a User Creating a Resource Creating a Role Adding a User to a Role