16.10 - Controlling Logons Through a Middle-Tier Application - Teradata Database

Teradata Database Security Administration

prodname
Teradata Database
vrm_release
16.10
created_date
June 2017
category
Administration
Security
featnum
B035-1100-161K

Many systems include middle-tier, non-Teradata, applications that stand between end-users and Teradata Database. A middle-tier application typically logs on to the database as a single permanent database user, and establishes a connection pool. The application then authenticates individual end-users, some of whom may request access to the database through the application connection pool.

By default, Teradata Database authorizes database privileges for application end-users, and monitors their database activity, based on the logon user identity of the application server.

You can optionally set up middle-tier applications to run trusted sessions, which enables the system to individually identify, authorize, and monitor application end-users.