The underlying table of this view is populated only if the DBC.AccLogRule security macro is installed and the DBA or security administrator has run one or more BEGIN LOGGING statements.
To install the DBC.AccLogRule security macro, contact Teradata Support.
Each row in the underlying table defines a rule controlling what privilege check is to be logged when a specific user attempts to access a specific object.
When a request is submitted that involves any of the rule criteria, the details of the involvement are recorded in the access log.
- Position 1 (every privilege check) indicates how often to log checks on this privilege when performed against any requests (submitted by a specified user) that attempt to access the specified object. Possible values for each position are as follows:
Value Meaning B Log FIRST and LAST occurrences. E Log each occurrence. F Log FIRST occurrence. L Log LAST occurrence. Blank Log nothing. - Position 2 indicates how often to log checks on this privilege when performed against requests (submitted by a specified user) that are not allowed to access the specified object (that is, check results are Denials).
Values and their meanings are the same as in step 1.
- Position 3 (save text of request) indicates whether to record the text of the requests that cause a check on this privilege.
Value Meaning - Save text only for Denial entries. + Save text for all entries. = Save text for all entries (specified in multiple BEGIN LOGGING statements). Blank No WITH TEXT option specified.
Referenced Columns
Data Dictionary view columns can be referenced table columns. That is, the value in the view column corresponds to a value in the selected column referenced in the table. Join the view and the referenced table based on the selected column and the referenced column.
Referenced columns for this view are:
| View Column | Referenced Column |
|---|---|
| UserName | Dbase.DatabaseName |
| DatabaseName | Dbase.DatabaseName |
| TVMName | TVM.TVMName |
| ConstraintName | SecConstraints.ConstraintName |