Types of Privileges - Teradata Database

Teradata Database Administration

Product
Teradata Database
Release Number
15.10
Language
English (United States)
Last Update
2018-10-06
Product Category
Software

Types of Privileges

You can explicitly grant database privileges to users, roles, or databases. Users also gain other privileges without a formal grant. Before you decide which privileges to explicitly grant, make sure you understand the privileges users receive by other means.

 

Privilege

Description

Implicit Privileges

Ownership

Users that own perm space have certain implicit (ownership) privileges on any object contained in the space they own, even if they did not create the object.

Note: You can transfer ownership using the GIVE statement.

Explicit privileges

Automatic

When a user creates a database object, Teradata Database automatically grants privileges to:

  • The creator of the object
  • A newly created user or database
  • GRANT

    You can grant privileges:

  • Directly to a user or database
  • To a role, then GRANT membership in the role to one or more users
  • To an external role, then map the external role to one or more groups of directory users
  • Inherited

    Privileges that a user acquires indirectly.

  • All users inherit the privileges of the system-generated user, PUBLIC, a role-like collection of privileges available by default, whether or not they have any other privileges. You can grant additional privileges to PUBLIC.
  • A user inherits all the privileges granted to each role of which the user is a member.
  • Directory users inherit the privileges of the database users and external roles to which they are mapped.
  • Note: The system logs automatic and explicit privileges in exactly the same way, and are indistinguishable as to how they were acquired. All privileges except implicit privileges are stored in the data dictionary in the DBC.AccessRights table, by each user.

    For a detailed discussion of privileges, see “Teradata Database User Privileges” in Chapter 5: “Creating Users and Granting Privileges” in Security Administration.