Middle-tier applications are situated between end users and Teradata Database. When a middle-tier application accesses the database, it must log on as a permanent database user and establish a session pool, after which end users can access the database through the application.
All middle-tier application users are authenticated by the application, or the network in which the application resides. For information on session pools, see Database Administration.
- If you implement trusted sessions, you can authorize database privileges for application users individually. For information on establishing trusted sessions and assigning user privileges, see Working with Middle-Tier Application Users.
- If you do not implement trusted sessions, all application users take on the identity and privileges of the application logon username. This strategy is not recommended because the database is unable to track users as individuals.