Network Security Policy Implementation | Teradata Vantage - Implementation Overview - Advanced SQL Engine - Teradata Database

Security Administration

Product
Advanced SQL Engine
Teradata Database
Release Number
17.05
17.00
Published
September 2020
Language
English (United States)
Last Update
2021-01-23
dita:mapPath
ied1556235912841.ditamap
dita:ditavalPath
lze1555437562152.ditaval
dita:id
B035-1100
lifecycle
previous
Product Category
Teradata Vantageā„¢
  1. Review network security policy options. See About Network Security Policy.
  2. Determine whether to use Teradata directory schema extensions or native directory schema to define security policy objects in the directory, and if necessary install Teradata schema extensions. See Directory Schema Considerations.
  3. Configure the top level security policy objects in the directory. See Configuring Top-Level Security Policy Objects.
  4. Configure the needed security policies:
  5. Review the effects of using RequireConfidentiality with QOP. See Requiring Confidentiality.
  6. Enable policies by configuring security policy attributes in the TDGSS user configuration file. See Configuring Security Policies in the TdgssUserConfigFile.xml.
  7. Monitor logs to detect QOP security policy violations and identify violators. See Monitoring QOP Security Policy.