Teradata Database provides the capability for two types of user security monitoring:
- All user logon and logoff activity is automatically collected in the Event Log and can be accessed using the DBC.LogOnOffV system view. Listed parameters include:
- Database username
- Session number
- Logon events, including the causes of any unsuccessful logons
- Optional access logging records user attempts to access the database and can be accessed using the DBC.AccessLogV view, including the following access parameters:
- Type of access
- Type of request
- Requesting database username
- Referenced database object
- Frequency of access
Access log entries are generated each time the database checks a privilege to determine whether or not it will honor a user request.