When you use certain Data Mover commands, such as create, move, or start, you must log in to the source and target Teradata Databases defined for the job. This section describes the security considerations related to logging into source and target systems used in Data Mover jobs.