Row-Level Security Implementation Process | Teradata Vantage - Row-Level Security Implementation Process - Analytics Database - Teradata Vantage

Security Administration

Deployment
VantageCloud
VantageCore
Edition
Enterprise
IntelliFlex
VMware
Product
Analytics Database
Teradata Vantage
Release Number
17.20
Published
June 2022
ft:locale
en-US
ft:lastEdition
2024-04-05
dita:mapPath
hjo1628096075471.ditamap
dita:ditavalPath
qkf1628213546010.ditaval
dita:id
zuy1472246340572
lifecycle
latest
Product Category
Teradata Vantageā„¢
  1. Create the security classifications that define security labels for users and data rows. See Defining Security Labels for Users and Rows.
  2. Create user-defined functions to define and enforce row level security restrictions. Creating Row Level Security UDFs.
  3. Grant the necessary administrator privileges for working with row level security constraints. See Granting Security Constraint Administrative Privileges.
  4. Create security constraint objects. See Working with Security Constraints.
  5. Assign security constraints and constraint values to database users. See Working with Constraint Assignments.
  6. Create/Alter tables to define security constraint columns. See Working with Security Constraint Columns.
  7. Assign constraint OVERRIDE privileges to users who need to bypass the enforcement of security constraints. See Working with Constraint OVERRIDE Privileges.
  8. Evaluate database objects and processes that interface with row level security tables, and where necessary, rework them to ensure conformance with row level security requirements. See Working with Row-Level Security Effects.
  9. Learn how the system derives the session constraint values under various conditions, and how to set alternate values. See Determining the Session Constraint Values.
  10. Enable logging of user attempts to access row level security tables, views, and administrative functions. Using Access Logging with Row Level Security.
  11. Access system tables and views that contain security constraint information. See Constraint-Related System Tables and Views.