Many systems include middle-tier, non-Teradata, applications that stand between end-users and Teradata Database. A middle-tier application typically logs on to the database as a single permanent database user, and establishes a connection pool. The application then authenticates individual end-users, some of whom may request access to the database through the application connection pool.
By default, Teradata Database authorizes database privileges for application end-users, and monitors their database activity, based on the logon user identity of the application server.
You can optionally set up middle-tier applications to run trusted sessions, which enables the system to individually identify, authorize, and monitor application end-users.