This section of the tutorial provides an introduction to authorization using InterSystems security. After completing this part of the tutorial, you will be able to:
List the different types of database assets protected by the InterSystems security system.
Create users, roles, and privileges.
Grant privileges to users by assigning them to roles.
Use the $SYSTEM.Security.Check method to protect code blocks from unauthorized access.