15.10 - Create or Administer Security Constraints - Teradata Administrator

Teradata Administrator User Guide

prodname
Teradata Administrator
vrm_release
15.10
category
User Guide
featnum
B035-2502-035K

Use the following procedure to administer security constraints.

Note: This feature is only available when connected to Teradata Database 14.0 and above.

1 From the main window, click Tools > Administer > Security Constraints.

2 Choose from the following:

  • To create a new security constraint, enter a new Name, and continue to the next step.
  • To modify an existing security constraint, select the security constraint in the Name field, and continue to the next step.
  • To drop an existing security constraint, select the security constraint in the Name field, and then click Drop.
  • 3 Define the attributes and options as indicated in Table 22.

    4 Click Create or Modify.

    Security Constraint Attributes and Options

     

    Table 22: Administer Security Constraints Dialog Box Description 

    Field or Control Name

    Description

    Name

    Lists all constraints currently defined on the Teradata Database.

    Type

    Sets or identifies the selected constraint type as Integer or Binary.

    Size

    Sets or displays the size of the constraint if the constraint type is Binary. The value must be between 1 and 32.

    Nullable

    Indicates if the selected constraint is nullable.

    Values

    Enter one value per line. Each line must contain a name followed by a colon and an integer value.

    Function Names (optional)

    Lists all user-defined functions in the SYSLIB database. Select the UDF for determining the user level for each action (Select, Insert, Update, and Delete).