The user categories shown in the table below require differing strategies for assigning profiles.
|Database User Type||Profile Assignment Method|
|Permanent database users||Specify the profile name in the CREATE USER or MODIFY USER statement for the user.|
|Directory users||Assign profiles to directory users in one of the following ways:
|Application logon users or trusted users||Specify the profile name in the CREATE or MODIFY USER statement for the user name under which the application logs on to the database. The application user profile applies to all users that log on through the application.|
|Proxy users||Proxy users who are also permanent database users, and for whom queries are sent to the database through a trusted user application, are subject to any row level security constraints that appear in the profile assigned to the corresponding permanent user.
All other profile-based privileges are taken from the profile assigned to the trusted user application.
For information on options for end users logging on through middle-tier applications, see Working with Middle-Tier Application Users.
For information on row level security constraints, see Implementing Row Level Security.
For information about the types of users that exist when you use secure zones, see Implementing Teradata Secure Zones.