16.10 - Using this Publication - Teradata Database

Teradata Database Security Administration

prodname
Teradata Database
vrm_release
16.10
created_date
June 2017
category
Administration
Security
featnum
B035-1100-161K

Teradata Database offers a number of security and user management features, some required and some optional. This publication presents security topics as a series of evaluation and implementation tasks, in approximately the order you should consider them when you set up database security.

The contents of this book are roughly in the order of how to implement Teradata security. For all site configurations, follow the guidelines in chapters 1 through 10.

If your site uses a directory, such as LDAP, after completing the setups in chapters 1 - 10, follow the procedures in chapters 13 - 14, implement either the setup in chapter 15 or the setup in chapter 16, and then continue your implementation in chapters 17-25.

Optionally, you can implement row level security (chapter 11) and Teradata Secure Zones (chapter 12).

Some of the procedures in this publication have dependencies on design and implementation of databases and tables, for example, assigning user privileges.

Each chapter of this publication provides a set of topics required for implementation of a particular Teradata Database security/user management feature, and typically includes:

  • A process overview that outlines the required evaluation and implementation tasks for the set of topics covered in the chapter. Some chapters present several independent topics, each including its own task sequence.
  • A list of prerequisites required before you begin the implementation process.
  • Detailed background information on each feature and option, including a description of the concept, the use case, definition of key terms, and cross-references to related topics.
  • A step-by-step implementation procedure for each feature.
  • Suggestions for identifying and fixing common problems.

For initial system implementation:

  1. Consider the chapters in the order presented.
  2. Review the introductory topics of each chapter to become familiar with the security features discussed, the decisions you must make, and the available options.
  3. Devise a security strategy based on your existing site requirements and your plans to implement Teradata Database security features.
  4. Incorporate your security strategy into a documented security policy. See Developing a Teradata Database Security Policy.

For adding security features after initial implementation:

  1. Skip directly to the feature of interest.
  2. Check the prerequisites, requirements, and options before implementing the feature.