16.10 - Implementation Overview - Teradata Database

Teradata Database Security Administration

Teradata Database
Release Number
Release Date
June 2017
Content Type
Publication ID
English (United States)
  1. Review network security policy options. See About Network Security Policy.
  2. Determine whether to use Teradata directory schema extensions or native directory schema to define security policy objects in the directory, and if necessary install Teradata schema extensions. See Directory Schema Considerations.
  3. Configure the top level security policy objects in the directory. See Configuring Top Level Security Policy Objects.
  4. Configure the needed security policies:
  5. Review the effects of using RequireConfidentiality with QOP. See Requiring Confidentiality.
  6. Enable policies by configuring security policy attributes in the TDGSS user configuration file. See Configuring Security Policies in the TdgssUserConfigFile.xml.
  7. Monitor logs to detect QOP security policy violations and identify violators. See Monitoring QOP Security Policy.