Teradata Vantage offers a number of security and user management features, some required and some optional. This publication presents security topics as a series of evaluation and implementation tasks, in approximately the order you should consider them when you set up database security.
Some of the procedures in this publication have dependencies on design and implementation of databases and tables, for example, assigning user privileges.
Each section of this publication provides a set of topics required for implementation of a particular security or user management feature, and typically includes:
- A process overview that outlines the required evaluation and implementation tasks for the set of topics.
- A list of prerequisites required before you begin the implementation process.
- Detailed background information on each feature and option, including a description of the concept, the use case, definition of key terms, and cross-references to related topics.
- A step-by-step implementation procedure for each feature.
- Suggestions for identifying and fixing common problems.
For initial system implementation:
- Review the introductory topics to become familiar with the security features discussed, the decisions you must make, and the available options.
- Devise a security strategy based on your existing site requirements and your plans to implement Teradata Vantage security features.
- Incorporate your security strategy into a documented security policy. See Developing a Teradata Vantage Security Policy.
For adding security features after initial implementation:
- Skip directly to the feature of interest.
- Check the prerequisites, requirements, and options before implementing the feature.