Skip to main content
Next section

About This Book

This book describes the functionality for securing Caché applications and deployed instances.

This book covers the following fundamental topics:

  • About Caché Security” provides an overview of the available security features.

  • Authentication” explains the theory and practice of configuring Caché to authenticate its users.

  • Assets and Resources” begins the authorization chapters by describing the data and activities Caché protects — called assets — and how they are represented within Caché — as what are called “resources.”

  • Privileges and Permissions” continues the authorization chapters by describing the mechanism for granting access to those resources.

  • Roles” continues the authorization chapters by describing how privileges are aggregated into the logical form called “roles” and how users can be associated with roles.

  • Users” continues the authorization chapters by describing the representation of those entities — called “users” — within Caché.

  • Services” continues the authorization chapters by describing how Caché protects the various means by which users and programs can connect to it, which are called “services.”

  • Applications” concludes the authorization chapters by describing how to create and use application-based security with Caché

  • Auditing” describes how to configure Caché to log various activities.

  • Managed Key Encryption” explains how to encrypt data on disk.

This book’s advanced topics are:

The book’s appendices are:

For a detailed outline, see the Table of Contents.

Other related topics in the Caché documentation set are:

  • The Caché Installation Guide, the “Preparing for Caché Security” appendix provides preliminary setup information for an instance that will use security.

  • Using Caché Server Pages (CSP), the “CSP Architecture” chapter describes how to configure CSP applications, including security-related properties.

  • Using Caché SQL, the Users, Roles, and Privileges chapter provides the SQL perspective on Caché security.

For general information, see Using InterSystems Documentation.