In the security contest, we encourage developers to share the solutions that show how to perform security tasks related to InterSystems IRIS and InterSystems IRIS for Health. We invite you to contribute apps that will reveal tasks related to the Authentication and Authorization parts of InterSystems Security Model
Here are the requirements:
If the application satisfies some additional requirements listed here, it gets additional technology votes.
Sample applications will be added soon. Stay tuned!
Any Developer Community member, except for InterSystems employees (ISC contractors allowed). Create an account!
Developers can team up to create a collaborative application. Allowed from 2 to 5 developers in one team.
Don't forget to highlight your team members in the README of your application – DC user profiles.
Log in to Open Exchange, open your application page, make sure that it meets the requirements, and click the "Apply for Contest" button. Your application will be sent for approval and once approved will appear on the Contest page eventually.
Experts Nomination
Community Nomination
By participating in the contest you agree with the following Terms and Conditions.
Visit contest landing page to read and discuss the rules, nominations & judgment criteria.
Join InterSystems Discord channel to chat about requirements, technology, voting, etc.
Data Anonymization tool for InterSystems IRIS
Author: Henry Hamon Pereira
Experts 66Community 137
An example on how to scan your REST APIs on IRIS using the OWASP
Author: José Roberto Pereira
Experts 55Community 142
InterSystems IRIS - SAML Authentication Test
Author: Dmitry Maslennikov
Experts 46Community 90
InterSystems IRIS Declarative Security Rules for REST APIs
Author: YURI MARX PEREIRA GOMES
Experts 40Community 95
OAuth Authentication, Authorization & Auditing basics
Author: Muhammad Waseem
Experts 37Community 54
Now an Authentication Provider for VS Code, for better security
Author: John Murray
Experts 24Community 72
Specify your middlewares. security treatments on all requests.
Author: davi massaru teixeira muta
Experts 18Community 54
Program for changing the security level of the system.
Author: Sergey Mikhailenko
Experts 14Community 35
Object Script mediator to audit ObjectScript REST API requests
Author: YURI MARX PEREIRA GOMES
Experts 14Community 33
Generating secure passwords and check strength of passwords
Author: Dmitry Maslennikov
Experts 13Community 69
An example of deploying solutions with prepared databases, even without source code.
Author: Sergey Mikhailenko
Experts 13Community 16
To meet the requirements of section 8.2.5 PCI DSS "Prohibit the use of old passwords", a small application has been implemented that will be launched by the system when a user tries to change a password and check if it was used before.
Author: Sergey Mikhailenko
Experts 11Community 57