Session Constraint Values for Permanent Database Users - Analytics Database - Teradata Vantage

Security Administration

Deployment
VantageCloud
VantageCore
Edition
Enterprise
IntelliFlex
VMware
Product
Analytics Database
Teradata Vantage
Release Number
17.20
Published
June 2022
Language
English (United States)
Last Update
2024-04-05
dita:mapPath
hjo1628096075471.ditamap
dita:ditavalPath
qkf1628213546010.ditaval
dita:id
zuy1472246340572
lifecycle
latest
Product Category
Teradata Vantageā„¢

When a permanent database user accesses a row protected by a security constraint, the system determines the session constraint values as follows:

  1. If the user profile has a corresponding security constraint assignment, the session uses the constraint values specified in the profile definition.
  2. If the user profile does not have a security constraint specification, the system derives the session constraint values from the user definition.
  3. Whether user constraint values are defined in a profile or user definition, if multiple constraint values are defined, the system determines the session values as follows:
    • For hierarchical (non-set) constraints, the system uses the DEFAULT value specified in the profile, or if there is no profile, in the user definition. If no DEFAULT is specified, the system uses first value listed for the constraint.
    • For non-hierarchical (set) constraints, the session uses all constraint values in the profile, or if there is no profile, in the user definition. No DEFAULT can be specified.
      Requesting users can use SET SESSION CONSTRAINT to change the session constraint value to any constraint value specified in the profile or user definition.
  4. If neither the user profile nor the user definition contains a security constraint assignment, the constraint value for the session is NULL, and the user can access rows controlled by a security constraint only if assigned the necessary OVERRIDE privileges.
  5. If a user has OVERRIDE privileges on the object and the operation being performed, the system ignores constraints assigned in the profile or user definition. The session derives security constraint values in one of the following ways:
    • For simple inserts, the user must supply the constraint values.
    • For compound statements, for example, INSERT ... SELECT or MERGE, the system derives constraint values from the security constraint columns in the source table.
    • The user can use SET SESSION CONSTRAINT to specify constraint values.