Teradata provides row level security as one way of controlling access to tables and views. Row level security controls user access by row and by SQL operation. Access rules are based on the relationship between the user access level and the row security level.
The following steps show the basic process for implementing row level security:
- Determine security classifications that will be used to define security labels for users and data rows.
- Create security constraint UDFs to define and enforce row level security restrictions.
- Create security constraint objects and specify the appropriate security UDF to control an INSERT, SELECT, UPDATE or DELETE operation. For more information, see the information about CREATE CONSTRAINT in Teradata Vantage™ - SQL Data Definition Language Detailed Topics, B035-1184.
- Assign security constraints to tables and users.
For more information about row level security, see Teradata Vantage™ - Advanced SQL Engine Security Administration, B035-1100.