In the Authorization section of this tutorial you have learned about the following:
The different types of database assets protected by the InterSystems security system.
Using InterSystems security resources to protect database assets .
Using InterSystems IRIS's role-based security system to assign privileges to users.
Using the $SYSTEM.Security.Check method to protect code blocks from unauthorized access.