Access logging keeps a record of database and user access. Access logging rules set the criteria for what to log. You can configure access logging rules for user and database objects.
- In the Navigation view, double-click Databases.
- In the Object List Viewer, right-click a database or user and select Access Logging Rules.
-
In the Define tab, specify the parameters and scope of the access logging you want Teradata Database to record.
Scroll right to view all available fields.
Option Description Options Denials Select to create a rule that only applies when access is denied. With SQL Select to record SQL statements in the access log. Frequency First Logs only the first access by the selected user to the selected object. Last Logs only the last access by the selected user to the selected object. First and Last Logs only the selected user's first and last access to the selected object. Each Logs each access by the selected user to the selected object. On Object ALL Select to create an access logging rule that applies to all databases and user objects.
You can still select a security constraint.
Database Select the database to which you want to create a rule. Object Type Select the object type to which you want to create a rule. Object Select the object to which you want to create a rule. Authorization Select an authorization from the list to create a rule that applies to a specific authorization that is defined on the database or user. Security Constraint Select a security constraint from the list to create a rule that applies to a specific constraint defined for a user. Action Begin Log Starts the access logging based on your selections. End Log Ends the access logging based on your selections. By User One of the following options: - Select All to create an access logging rule that applies to all users.
- Select a user from the list to creates a rule that applies to specific users. To select multiple users, use the Shift and Ctrl keys.
User Selection Depending on the check box you select in this section, other boxes are selected.- ALL
- DICTIONARY
- CREATE
- DROP
- ACCESS
- MAINTENANCE
NORMAL If no check boxes are selected in the User Selection section, select specific SQL statements to log. CREATE DROP - Click Begin Log to start the access logging based on your selections.
- Click SQL to verify the generated SQL is correct.
- Click Commit. An Access Logging Rules message confirms that the logging rule was created successfully.