Network Security Policy Implementation | Teradata Vantage - Implementation Overview - Advanced SQL Engine - Teradata Database

Security Administration

Product
Advanced SQL Engine
Teradata Database
Release Number
17.10
Published
July 2021
Language
English (United States)
Last Update
2022-02-15
dita:mapPath
ppz1593203596223.ditamap
dita:ditavalPath
wrg1590696035526.ditaval
dita:id
B035-1100
lifecycle
previous
Product Category
Teradata Vantageā„¢
  1. Review network security policy options. See Network Security Policy.
  2. Determine whether to use Teradata directory schema extensions or native directory schema to define security policy objects in the directory, and if necessary install Teradata schema extensions. See Directory Schema Considerations.
  3. Configure the top level security policy objects in the directory. See Configuring Top-Level Security Policy Objects.
  4. Configure the needed security policies:
  5. Review the effects of using RequireConfidentiality with QOP. See Requiring Confidentiality.
  6. Enable policies by configuring security policy attributes in the TDGSS user configuration file. See Configuring Security Policies in the TdgssUserConfigFile.xml.
  7. Monitor logs to detect QOP security policy violations and identify violators. See Monitoring QOP Security Policy.