Pesquisar

Article
· 6 hr ago 2m read

FHIR OAuth Highlight (2024.3+) - New Client QuickStart

Also in previous versions you could define your FHIR Server to accept requests via OAuth 2.0 (e.g. for a SMART on FHIR client) but nowadays with v2024.3, which was released a while ago, there is a new feature, that enables doing this more easily - the OAuth FHIR Client QuickStart.

This "QuickStart" is a Wizard-like "helper" that allows you to connect your FHIR server to an OAuth server and enable OAuth authentication and authorization for FHIR requests, within 5 simple steps (really just 3...).

  • Step 1 - Create or Choose FHIR Server

You might have already a FHIR Server (Endpoint) you defined, or you might have not defined one yet, and want to define one now, as part of this QuickStart.

  • Step 2 - Select FHIR Server

If you chose to 'Use an Existing' you will be shown available endpoints, per Namespace. For example:

If you chose to 'Create New' you'll be shown a small form to create a new endpoint:

This is similar to what you would see if you create the endpoint before hand by yourself:

  • Step 3 - Select OAuth Server Type

You can chose to use an external OAuth server (e.g. auth0 by Okta), or use the built-in OAuth Server within InterSystems IRIS.

If you want to use IRIS as your OAuth Server, you'll need to setup IRIS as an OAuth server, supporting FHIR, you have a "shortcut" for that as well, a method you can call that will set this up for you.

Note Secure Communication needs to be setup for this to work.

  • Step 4 - Configure OAuth Server

If you chose to use an external OAuth server, you will be prompted for it's Issuer Endpoint:

If you happened to have defined one already you can choose it from the dropdown, if not you can type (or paste) it in.

In any case you can test this OAuth server endpoint, for example:

  • Step 5 (or 4 if you chose the internal IRIS OAuth server) - Confirm

You'll see a short confirmation info and a 'Confirm' button.

For example (choosing to create a new FHIR Server, and using the IRIS internal OAuth server):

Or for example (choosing an existing FHIR endpoint, and an external OAuth server):

If all goes well you'll see a message this was created successfully.

If not, you'll get an appropriate message.

Behind the scenes you should be able to observe a few things -

  • You'll see the client defined under the OAuth clients (with it's details):

  • You'll see the client defined in your FHIR Endpoint:

  • In the general Security section of the Management Portal, under OAuth 2.0, you will also be able to find a Client Definition with a Client Configuration.

Assuming all the above is working you can start using OAuth (and specifically SMART on FHIR) to communicate with your FHIR Server.

More on that... in a future Article...

2 new Comments
Discussion (2)2
Log in or sign up to continue
Article
· 8 hr ago 1m read

Stale SQL Statements/Statistics (Or: Why do I have a Huge ^rINDEXSQL Global?)

Looking at my database I see I have a very big ^rINDEXSQL global? Why is that? 😬

In the Management Portal SQL page, under "SQL Statements" I see a 'Clean stale' button - what does this do? 🤔

In the list of Statements some have a 'Location' value and some don't? How is that? 🤨

Well, indeed these are all related.

In general we keep basic statistics for SQL queries that were run. When you purge cached SQL queries, we do not delete the statement entry in the statement list, and keep the statistics (because this might be useful for future comparison). We do "clear" the Location column (as it does not point anymore to an existing cached query).

If you want to clean out these "stale" statements (ones that don't point anymore) you can press the "Clean stale" button.

This is what this could look like (System Explorer -> SQL -> SQL Statements):

 

[Note in older versions, e.g. v2020.1 there was a background Task that would clean these statements - "Clean SQL Index - Clean up stale SQL Statement Index entries", see also here, but this has been removed in newer versions, see MAK5205]

Discussion (0)1
Log in or sign up to continue
Digest
· 9 hr ago

Publications des développeurs d'InterSystems, semaine Décembre 15 - 21, 2025, Résumé

Décembre 15 - 21, 2025Week at a GlanceInterSystems Developer Community
Job
· 9 hr ago

Why CISM Certification Is Essential for Cybersecurity Leaders in 2026

In 2026, cybersecurity is no longer just a technical function—it is a core business leadership responsibility. Organizations face rising threats from ransomware, AI-driven attacks, regulatory pressure, and reputational risks that directly impact revenue and trust. In this environment, leaders who can align security strategy with business objectives are in high demand. This is where the Certified Information Security Manager (CISM) credential stands out. Earning the cism credential equips cybersecurity leaders with the governance, risk, and management expertise required to protect enterprises at a strategic level.

Unlike purely technical certifications, CISM focuses on leadership, decision-making, and enterprise security management, making it a critical qualification for professionals aiming to move into senior security roles.


The Changing Role of Cybersecurity Leaders

From Technical Expert to Strategic Decision-Maker

Cybersecurity leaders in 2026 are expected to do far more than manage firewalls or respond to incidents. They are accountable for:

  • Aligning security initiatives with business goals
  • Managing enterprise-wide cyber risks
  • Communicating security posture to executives and boards
  • Ensuring regulatory compliance and governance

This shift has created a strong demand for professionals with business-focused security expertise, not just hands-on technical skills.


What Makes CISM Different from Other Cybersecurity Certifications?

A Management-First Approach to Security

The cism-certification is governed by ISACA and is globally recognized for its emphasis on information security management. It validates a professional’s ability to:

  • Design and manage enterprise security programs
  • Govern information security frameworks
  • Assess and mitigate organizational risk
  • Lead incident response and recovery efforts

Key difference:
While many certifications focus on how security tools work, CISM focuses on why security decisions are made and how they impact business outcomes.


Why CISM Certification Matters More Than Ever in 2026

1. Rising Cybersecurity Governance and Compliance Requirements

Governments and regulatory bodies worldwide continue to introduce stricter data protection and cybersecurity laws. Security leaders must now ensure compliance with frameworks and regulations while maintaining operational efficiency.

CISM-trained professionals excel at:

  • Security governance
  • Policy development
  • Risk-based decision-making

These skills are essential for navigating complex compliance landscapes in 2026.


2. Increased Board-Level Visibility of Cyber Risks

Cyber incidents now directly affect:

  • Brand reputation
  • Customer trust
  • Shareholder confidence

As a result, cybersecurity leaders are expected to communicate risks in business language, not technical jargon. The CISM framework prepares professionals to engage confidently with senior leadership and board members.


3. Demand for Cybersecurity Leaders Outpaces Supply

Organizations are struggling to find qualified security managers who can bridge the gap between IT and business strategy. This shortage makes cism-certification holders highly competitive in the job market.

Common roles that prefer or require CISM include:

  • Information Security Manager
  • IT Risk Manager
  • Security Governance Lead
  • Chief Information Security Officer (CISO)

Core Skills You Gain with CISM Certification

Strategic Competencies That Set Leaders Apart

The CISM curriculum is built around four critical domains:

  • Information Security Governance – Aligning security strategy with business goals
  • Information Risk Management – Identifying, analyzing, and mitigating enterprise risks
  • Information Security Program Development and Management – Building scalable security programs
  • Incident Management – Planning and executing effective response strategies

Together, these domains develop well-rounded cybersecurity leaders, not just technical specialists.


Career Growth and Salary Advantages

A Clear Path to Leadership Roles

Professionals with CISM certification often experience:

  • Faster career progression
  • Increased leadership opportunities
  • Higher earning potential

Because the certification validates both technical understanding and managerial competence, employers view CISM holders as long-term strategic assets rather than operational staff.


Why Organizations Prefer CISM-Certified Leaders

From an employer’s perspective, hiring CISM-certified professionals means:

  • Stronger security governance frameworks
  • Better risk visibility and reporting
  • Reduced likelihood of costly security incidents
  • Improved alignment between IT security and business strategy

This organizational value is a major reason why CISM continues to gain importance in 2026.


Is CISM the Right Choice for You?

Ideal Candidates for CISM Certification

CISM is best suited for:

  • Experienced IT and security professionals
  • Cybersecurity managers and team leads
  • Risk and compliance professionals
  • Aspiring CISOs and security executives

If your goal is to move beyond technical execution and into cybersecurity leadership, CISM is a logical and powerful next step.


The Future of Cybersecurity Leadership

As cyber threats become more sophisticated and business-driven, the need for security leaders who understand governance, risk, and strategy will only grow. Certifications that focus solely on tools or technologies may fall short in preparing professionals for executive responsibilities.

The cism-certification remains one of the most respected credentials for shaping future-ready cybersecurity leaders who can protect organizations while enabling growth and innovation.


Conclusion

In 2026, cybersecurity leadership demands a blend of technical insight, business acumen, and strategic governance. CISM certification delivers exactly that combination. It empowers professionals to lead security initiatives with confidence, communicate risk effectively, and align cybersecurity with enterprise objectives. For organizations and individuals alike, investing in strong leadership credentials is no longer optional—it’s essential. To learn more about professional training standards and learner success stories, explore Sprintzeal’s global learning ecosystem at about us.

Discussion (0)1
Log in or sign up to continue