Client software enables the enforcement of this security feature by providing code developers with the ability to indicate whether an SQL request is trusted or not. To do this for a CLIv2 application, use the Trusted flag of the CLIv2 Options parcel to specify Y if a request is trusted or N if a request is not.
Refer to either Teradata® Call-Level Interface Version 2 Reference for Workstation-Attached Systems, B035-2418 or Teradata® Call-Level Interface Version 2 Reference for Mainframe-Attached Systems, B035-2417, as appropriate, for detailed information about the Options parcel and how CLIv2 applications can be coded using Parcel Mode Fetch operations and the DBCAREA.
Each of the Teradata application APIs provides a mechanism for applications to specify whether requests are to be trusted or not. This mechanism prohibits an SQL request from being upgraded from a nontrusted status to trusted status. Refer to the appropriate Teradata Tools and Utilities documentation to determine how the API you are using for your middle tier application handles this feature.