For information on... | See... |
---|---|
Creating trusted users and proxy users | Working with Middle-Tier Application Users. |
Using query banding in a trusted user application to set proxy user characteristics | the Teradata Orange Book:.Using Query Banding in Teradata Vantage Orange Book |
Setting up administrators to manage row level security constraints | Working with Security Constraint Administrative Privileges. |