Access Logging for Proxy Users | Teradata Vantage - 17.20 - Using Access Logging for Proxy Users - Analytics Database - Teradata Vantage

Teradata Vantage™ - Analytics Database Security Administration - 17.20

Deployment
VantageCloud
VantageCore
Edition
Enterprise
IntelliFlex
VMware
Product
Analytics Database
Teradata Vantage
Release Number
17.20
Published
June 2022
Language
English (United States)
Last Update
2023-03-07
dita:mapPath
hjo1628096075471.ditamap
dita:ditavalPath
qkf1628213546010.ditaval
dita:id
zuy1472246340572

By default, the system logs all users that log on through a middle-tier application as a single identity, the application logon username. You can optionally use the GRANT CONNECT THROUGH statement to set up trusted user applications to identify individual proxy users.

When proxy users request services from the trusted user application that involve access to the database, Vantage logs the activities individual users, if logging functions are active, for example, in the DBC.AccessLog and DBC.QueryLog. To assist in investigating security events that involve proxy users, these logs show the entire query band string in effect for the request, and includes the proxy user logon username.

For more on creating proxy users, see Working with Middle-Tier Application Users.