Information about current session pools, which are a collection of sessions that are logged on to the database under the same logonid, may be accessed by entering the DISPLAY POOL command. See Teradata® Director Program Reference, B035-2416.
LogonSource
Teradata recommends using alternative columns instead of the LogonSource column, if available. For information about the recommended columns for LogonSource, see "LogonSource Column Fields and Examples."
ClientConfCipherSuite and UnityConfCipherSuite
ASCII String representing the confidentiality cipher suite. This is the TLS cipher suite, for example: "TLS_AES_256_GCM_SHA384".
ClientConfVersion and UnityConfVersion
ASCII String representing the confidentiality version number. This is the TLS version number, for example: "TLS 1.2".
Possible Values for ClientConfType
| Value | Description |
|---|---|
| C | TLS used for encryption. Client validated the Certificate-Authority chain but ignored the Subject-Alternative-Name and the Common-Name. |
| E | TDGSS used for encryption. The application does not have the option to change this during the session. |
| F | TLS was attempted but failed, so this is a fallback to using TDGSS for encryption because ENCRYPTDATA is specified. |
| H | TLS was attempted but failed, so this is a fallback to unencrypted because ENCRYPTDATA is not specified. |
| O | May be encrypted using TDGSS or unencrypted. The application has the option of changing this at any time. This is possible only with CLIv2 apps, because drivers (for example, ODBC, JDBC) do not switch encryption on and off within a session. |
| R | TLS used for encryption. Server certificate was ignored; client did not validate the identity of the server. |
| U | Unencrypted. The application does not have the option to change this during the session. |
| V | TLS used for encryption. Client validated the Certificate-Authority chain and the Subject-Alternative-Name or the Common-Name. |
Possible Values for ClientConnectionType
| Value | Description |
|---|---|
| 1 | Client is connected using TCP/IP using the gateway. |
| 2 | Client is connected from a mainframe using a mainframe-attached host. |
Possible Values for CurrentCollation
| Value | Description |
|---|---|
| A | ASCII |
| E | EBCDIC |
| H | Host |
| M | Multinational |
| C | CharSet_Coll |
| J | JIS_Coll |
Possible Values for DirUserNetConfidentiality, UnityNetConfidentiality, EffectiveSessionNetConf
When set to I or C, these columns indicate the level of protection required.
| Value | Description |
|---|---|
| I | Indicates the level of protection required for Integrity, looked up in the LDAP directory used for security policy. The levels are: Default (D), Low (L), Medium (M), and High (H). |
| C | Indicates the level of protection required for Confidentiality, looked up in the LDAP directory used for security policy. The levels are: Default (D), Low (L), Medium (M), and High (H). |
Possible Values for ExpiredPassword
| Value | Description |
|---|---|
| Y | Yes, by Session Control procedures |
| N | No, by the Parser when a new password is assigned to the user |
Possible Values for LogonRedrive
| Value | Description |
|---|---|
| ' ' | Not participating |
| MEMORY NON-FALLBACK RESPONSES | Memory-based Redrive participation |
| NULL or blanks | Session is not participating in Redrive and database restarts are not transparent to applications and users. |
Possible Values for LoadingOp
| Value | Description |
|---|---|
| T | Session isolated loading is enabled. This is the default setting for a session. |
| F | Session isolated loading is disabled. |
Possible Values for Partition
| Value | Description |
|---|---|
| 7 | Console Utility Partition number |
| 8 | Partition in which DBC Console procedures are started by the Host utility |
| 9 | File System Partition number |
| 10 | Gateway partition number |
| 11 | Worker Task Partition number |
| 12 | Session Control Partition number |
| 13 | Dispatcher Partition number |
| 14 | Parser Partition number |
| 15 | Startup Partition number |
| 17 | Resource Sampling Subsystem (RSS) StartUp Partition number |
| 18 | Distributed Database File (DDF) Server Partition number |
| 19 | Relay Services Gateway (RSG) Partition number |
| 47 | Replication Gateway rsgdbsmain partition number |
Possible Values for ProxyLogon
| Value | Description |
|---|---|
| T | The ProxyLogon column indicates if Unity has logged a user onto a TD2 session using existing credentials, when that user was successfully logged on by another Unity-managed Vantage system using TD2. When this occurs, ProxyLogon is set to T. |
| F | False indicates the TD2 session logged on or attempted to log on with a valid password. |
Possible Values for ServerConfType
| Value | Description |
|---|---|
| E | TDGSS used for encryption, either enforced by policy or asserted by a Client. |
| O | May be encrypted using TDGSS or unencrypted, as asserted by a Client, or because security policy cannot be determined. |
| T | TLS used for encryption. |
| U | Unencrypted, as asserted by a Client Interface. |
Possible Values for ServerUnityConfType
| Value | Description |
|---|---|
| E | TDGSS used for encryption, either enforced by policy or asserted by Unity. |
| O | May be encrypted using TDGSS or unencrypted. Cannot be determined by the gateway. |
| T | TLS used for encryption. |
| U | Unencrypted, as asserted by Unity. |
Possible Values for TTGranularity
| Value | Description |
|---|---|
| LOGICALROW | Row is timestamped with the time the row is processed by the AMP. |
| REQUEST | Row is timestamped with the time the request is submitted. |
| TRANSACTION | Row is timestamped with the time when the first non-locking reference is made to a temporal table, or when the built-in function TEMPORAL_TIMESTAMP is first accessed during the transaction. |
Possible Values for UnicodePassThrough
| Value | Description |
|---|---|
| S | UNICODE PASS THROUGH session attribute is enabled. |
| F | UNICODE PASS THROUGH session attribute is not enabled. |
Possible Values for UnityConfType
| Value | Description |
|---|---|
| E | TDGSS used for encryption. |
| F | TLS was attempted but the handshake failed, so this is an attempt to fallback to using TDGSS for encryption. This is otherwise equivalent to "E". |
| T | TLS used for encryption. |
| U | Unencrypted. |