16.10 - Controlling Logons Through a Middle-Tier Application - Teradata Database

Teradata Database Security Administration

Teradata Database
Release Number
Release Date
June 2017
Content Type
Publication ID
English (United States)

Many systems include middle-tier, non-Teradata, applications that stand between end-users and Teradata Database. A middle-tier application typically logs on to the database as a single permanent database user, and establishes a connection pool. The application then authenticates individual end-users, some of whom may request access to the database through the application connection pool.

By default, Teradata Database authorizes database privileges for application end-users, and monitors their database activity, based on the logon user identity of the application server.

You can optionally set up middle-tier applications to run trusted sessions, which enables the system to individually identify, authorize, and monitor application end-users.