Authorization of Middle-Tier Application Users | Teradata Vantage - Authorization of Middle-Tier Application Users - Teradata Vantage

Configuring Teradata Vantageā„¢ After Installation

Product
Teradata Vantage
Release Number
2.2
Published
January 2021
Language
English (United States)
Last Update
2021-05-08
dita:mapPath
gta1588198788318.ditamap
dita:ditavalPath
dby1605127568110.ditaval
dita:id
B700-4014
Product Category
Analytical Ecosystem
Software
Teradata Vantage

Middle-tier applications stand between end users and Vantage, accepting requests from users, constructing queries from those requests, passing the queries to the database, and then returning results to the users. The middle-tier application logs on to the database, is authenticated as a permanent database user, and establishes a connection pool. The application then authenticates the individual application end users, some of whom may request access to the database through the connection pool.

For sites that require end users to be individually identified, authorized, and audited, the middle-tier application can be configured to offer trusted sessions.

By default, all end-users accessing the database through a middle-tier application are authorized database privileges and are audited in access logs, based on the single permanent database user identity of the application.