Logons through Middle-Tier Applications | Teradata Vantage - Controlling Logons through a Middle-Tier Application - Teradata Vantage - Analytics Database

Security Administration

Deployment
VantageCloud
VantageCore
Edition
VMware
Enterprise
IntelliFlex
Product
Analytics Database
Teradata Vantage
Release Number
17.20
Published
June 2022
ft:locale
en-US
ft:lastEdition
2025-03-29
dita:mapPath
hjo1628096075471.ditamap
dita:ditavalPath
qkf1628213546010.ditaval
dita:id
zuy1472246340572
lifecycle
latest
Product Category
Teradata Vantageā„¢

Many systems include middle-tier, non-Teradata, applications that are between end-users and Teradata Vantage. A middle-tier application typically logs on to the database as a single permanent database user, and establishes a connection pool. The application then authenticates individual end-users, some of whom may request access to the database through the application connection pool.

By default, Vantage authorizes database privileges for application end-users, and monitors their database activity, based on the logon user identity of the application server.

You can optionally set up middle-tier applications to run trusted sessions, which enables the system to individually identify, authorize, and monitor application end-users.