Security Constraints | Privileges for Database Administration | Teradata Vantage - Security Constraints - Teradata Vantage - Analytics Database

SQL Data Control Language

Deployment
VantageCloud
VantageCore
Edition
VMware
Enterprise
IntelliFlex
Product
Analytics Database
Teradata Vantage
Release Number
17.20
Published
June 2022
ft:locale
en-US
ft:lastEdition
2025-03-29
dita:mapPath
sgu1628111251052.ditamap
dita:ditavalPath
qkf1628213546010.ditaval
dita:id
dvv1472243528022
lifecycle
latest
Product Category
Teradata Vantageā„¢
Goal Privileges User Needs
Create, alter, or drop CONSTRAINT objects CONSTRAINT DEFINITION privilege (system level).
  • Assign constraints to users and profiles
  • Remove constraints from users and profiles
  • Define and remove security constraint table columns in tables, views and indexes
  • Grant and revoke security constraint OVERRIDEs
CONSTRAINT ASSIGNMENT privilege (system level).

For managing security constraints for users, tables, views and indexes the user must also have the necessary CREATE/REPLACE/ MODIFY privileges on the object.

Run SHOW CONSTRAINT statement CONSTRAINT DEFINITION or CONSTRAINT ASSIGNMENT privilege.
Bypass enforcement of security constraint UDFs OVERRIDE INSERT, OVERRIDE SELECT, OVERRIDE UPDATE, OVERRIDE DELETE for the security constraint, on the object being accessed.