Skip to main content
Previous sectionNext section

Authorization

This section of the tutorial provides an introduction to authorization using Caché security. After completing this part of the tutorial, you will be able to:

  • List the different types of database assets protected by the Caché security system.

  • Create users, roles, and privileges.

  • Grant privileges to users by assigning them to roles.

  • Use the $SYSTEM.Security.Check method to protect code blocks from unauthorized access.

Note:

For in-depth dicussion of authorization using Caché security, read Authorization Basics in the About Caché Security section of the Caché Security Administration Guide. See also the following sections of the Caché Security Administration Guide: Assets and Resources, Privileges and Permissions, Roles, Users, and Services.

Note:

Click here to begin.