Network Security Policy Implementation | Teradata Vantage - 17.10 - Implementation Overview - Advanced SQL Engine - Teradata Database

Teradata Vantage™ - Advanced SQL Engine Security Administration

Advanced SQL Engine
Teradata Database
Release Number
Release Date
July 2021
Content Type
Publication ID
English (United States)
  1. Review network security policy options. See Network Security Policy.
  2. Determine whether to use Teradata directory schema extensions or native directory schema to define security policy objects in the directory, and if necessary install Teradata schema extensions. See Directory Schema Considerations.
  3. Configure the top level security policy objects in the directory. See Configuring Top-Level Security Policy Objects.
  4. Configure the needed security policies:
  5. Review the effects of using RequireConfidentiality with QOP. See Requiring Confidentiality.
  6. Enable policies by configuring security policy attributes in the TDGSS user configuration file. See Configuring Security Policies in the TdgssUserConfigFile.xml.
  7. Monitor logs to detect QOP security policy violations and identify violators. See Monitoring QOP Security Policy.