Configuring Role-Based Access
Learn how to secure your system and specify the actions that each user of InterSystems IRIS® data platform can perform. The mechanism we use to control user authorization to perform actions is called role-based access control.
If you are already familiar with role-based access control, the InterSystems IRIS scheme will likely resemble some of those you have worked with before. With role-based access, you can:
- Group permissions into particular roles. This streamlines the process of providing access to new users and updating permissions for multiple users in a role, and it optimizes administrator time.
- Use a set of predefined roles or modify them to fit your needs.
- Easily add a new set of permissions to a user by grouping permissions into a new role and assigning that role to the user.
Watch the video and try the exercise below!