Working with Security Constraints - Analytics Database - Teradata Vantage

Security Administration

Deployment
VantageCloud
VantageCore
Edition
Enterprise
IntelliFlex
VMware
Product
Analytics Database
Teradata Vantage
Release Number
17.20
Published
June 2022
Language
English (United States)
Last Update
2024-02-29
dita:mapPath
hjo1628096075471.ditamap
dita:ditavalPath
qkf1628213546010.ditaval
dita:id
zuy1472246340572
lifecycle
latest
Product Category
Teradata Vantageā„¢
Each CONSTRAINT object defines a set of row level security constraints, including:
  • A security label category and the range of values (levels or compartments) for the category.
  • Specification of up to four UDFs, INSERT, SELECT, UPDATE and DELETE, which define and enforce the security constraints.
You can apply the security constraints in a CONSTRAINT object to the following:
  • User by specifying the CONSTRAINT object in the following:
    • CREATE USER or MODIFY USER statement
    • CREATE PROFILE or MODIFY PROFILE statement, and then assigning the profile to the user
  • Table by defining a constraint column that is named for the CONSTRAINT object in a CREATE TABLE or ALTER TABLE statement.