Access Logging Fields and Controls
Field or Control |
Description |
On Database |
This is a list of all databases available for access logging. Select one from the list, or click the All check box to select all databases in the list. |
All |
Select to create an access rule that applies to all databases. |
Object Type |
Select the type of object to create or remove an access logging rule. |
Object |
This is a list of all objects in the selected database. |
By User |
This is a list of all the Users on the database. Select the user(s) to create an access logging rule. To create a rule that applies to all users, click the All check box. |
All |
Creates an access rule that applies to all users. |
Denials |
Creates a rule that applies only when access is denied. Two rules for the same user and object can be defined, but with a different Denials setting. This can be useful to log all access without SQL, but log the SQL for all Denials. Alternatively, log only the first successful access, but log all (each) denials. |
With SQL |
Records the SQL statement in the access log. |
First |
Logs only the selected user(s) first access to the selected object. |
Last |
Logs only the selected user(s) last access to the selected object. |
First and Last |
Logs only the selected user(s) first and last access to the selected object. |
Each |
Logs the selected user(s) every access to the selected object. |
Normal |
Select the normal types of access to log. To save time in selecting multiple commands, use the Groups check boxes. |
Create |
Select the create statements to log. To save time in selecting multiple commands, use the Groups check boxes. |
Drop |
Select the drop statements to log. To save time in selecting multiple commands, use the Groups check boxes. |
Groups: All |
Selects all available commands for logging. |
Groups: Dictionary |
Selects all available dictionary commands for access logging. |
Groups: Access |
Selects all available access commands for access logging. |
Groups: Maintenance |
Selects all available maintenance commands for access logging. |
Security Constraint |
Lists all available security constraints. This feature is only available when connected to Teradata Database 14.0 and later. |