17.20 - Session Processing for Trusted Sessions - Analytics Database - Teradata Vantage

Teradata Vantage™ - Analytics Database Security Administration - 17.20

Deployment
VantageCloud
VantageCore
Edition
Enterprise
IntelliFlex
VMware
Product
Analytics Database
Teradata Vantage
Release Number
17.20
Published
June 2022
Language
English (United States)
Last Update
2023-03-07
dita:mapPath
hjo1628096075471.ditamap
dita:ditavalPath
qkf1628213546010.ditaval
dita:id
zuy1472246340572

After you set up trusted sessions, logons by end users proceed as follows:

  1. An application defined as a trusted user logs on to Teradata Vantage as a permanent database user, and creates a connection pool.
  2. An application end user (defined as a proxy user) logs on and is authenticated by the application.
  3. The proxy user requests a service that requires access to Vantage.
  4. The application gets a connection from the pool and issues a SET QUERY_BAND, which identifies the PROXYUSER and sets the role and query band duration, establishing a trusted session.
  5. The database authorizes proxy user privileges in Vantage based on the roles assigned to the user.
  6. Vantage records the proxy user identity in all access and query log entries.
  7. A trusted session persists for the life of the query band.