Integrating with InterSystems Security


When using CSP to provide connectivity for VC/m's browser interface, VC/m users can be authenticated using the standard InterSystems security mechanisms.

1. Begin by setting up your user accounts in InterSystems security.

2. Set up your user accounts in you VC/m environment VC/m.

Note: The user account must have its username or one of its aliases match the InterSystem security username. Password fields should be left blank unless they are required for restricting access to Beyond Compare.

3. Configure the VC/m CSP application in System Manager Portal. Set the following checkboxes in the 'Allowed authentication methods' field as follows:

  • 'Unauthenticated': Unchecked
  • 'Password': Checked

Caché user accounts used by VC/m will need sufficient privileges to access all relevant databases, including write permission on the VC/m repository database itself. They will also need the %System_Callout:U privilege in order to issue operating system commands (e.g. for manipulating a file component's read-only attribute).


See Also: Users and Access Controls, Managing Users and Access Controls