Security Administration Features | Teradata Vantage - Using this Publication - Advanced SQL Engine - Teradata Database

Security Administration

Product
Advanced SQL Engine
Teradata Database
Release Number
17.05
17.00
Published
September 2020
Language
English (United States)
Last Update
2021-01-23
dita:mapPath
ied1556235912841.ditamap
dita:ditavalPath
lze1555437562152.ditaval
dita:id
B035-1100
lifecycle
previous
Product Category
Teradata Vantageā„¢

Teradata Vantage offers a number of security and user management features, some required and some optional. This publication presents security topics as a series of evaluation and implementation tasks, in approximately the order you should consider them when you set up database security.

Some of the procedures in this publication have dependencies on design and implementation of databases and tables, for example, assigning user privileges.
Each section of this publication provides a set of topics required for implementation of a particular security or user management feature, and typically includes:
  • A process overview that outlines the required evaluation and implementation tasks for the set of topics.
  • A list of prerequisites required before you begin the implementation process.
  • Detailed background information on each feature and option, including a description of the concept, the use case, definition of key terms, and cross-references to related topics.
  • A step-by-step implementation procedure for each feature.
  • Suggestions for identifying and fixing common problems.

For initial system implementation:

  1. Review the introductory topics to become familiar with the security features discussed, the decisions you must make, and the available options.
  2. Devise a security strategy based on your existing site requirements and your plans to implement Teradata Vantage security features.
  3. Incorporate your security strategy into a documented security policy. See Developing a Teradata Vantage Security Policy.

For adding security features after initial implementation:

  1. Skip directly to the feature of interest.
  2. Check the prerequisites, requirements, and options before implementing the feature.