Security Constraints | Privileges for Database Administration | Teradata Vantage - Security Constraints - Advanced SQL Engine - Teradata Database

Security Administration

Product
Advanced SQL Engine
Teradata Database
Release Number
17.05
17.00
Published
September 2020
Language
English (United States)
Last Update
2021-01-23
dita:mapPath
ied1556235912841.ditamap
dita:ditavalPath
lze1555437562152.ditaval
dita:id
B035-1100
lifecycle
previous
Product Category
Teradata Vantageā„¢
To... the user must have the...
create, alter, or drop CONSTRAINT objects CONSTRAINT DEFINITION privilege (system level).
  • assign constraints to, and remove them from, users and profiles
  • define and remove security constraint table columns in tables, views and indexes
  • grant and revoke security constraint OVERRIDEs
CONSTRAINT ASSIGNMENT privilege (system level).

For managing security constraints for users, tables, views and indexes the user must also have the necessary CREATE/REPLACE/ MODIFY privileges on the object.

execute the SHOW CONSTRAINT statement CONSTRAINT DEFINITION or CONSTRAINT ASSIGNMENT privilege.
bypass enforcement of security constraint UDFs OVERRIDE INSERT, OVERRIDE SELECT, OVERRIDE UPDATE, OVERRIDE DELETE for the security constraint, on the object being accessed.