This section of the tutorial provides an introduction to authorization using InterSystems security. After completing this part of the tutorial, you will be able to:
List the different types of database assets protected by the InterSystems security system.
Create users, roles, and privileges.
Grant privileges to users by assigning them to roles.
Use the $SYSTEM.Security.Check method to protect code blocks from unauthorized access.
For in-depth discussion of authorization using InterSystems security, see About InterSystems Authorization. See also Using Resources to Protect Assets, Privileges and Permissions, Roles, Users, and Services.