16.10 - Implementation Overview - Teradata Database

Teradata Database Security Administration

prodname
Teradata Database
vrm_release
16.10
created_date
June 2017
category
Administration
Security
featnum
B035-1100-161K
  1. Evaluate authentication and authorization options and devise a strategy. See:
  2. Enable external authentication, if required. See:
  3. If you decide to use Kerberos authentication (KRB5 or SPNEGO mechanism), complete the required setup. See Working with Kerberos Authentication.
  4. If you decide to authenticate and/or authorize users in an LDAPv3-compliant directory, see the chapters beginning with Directory Management of Database Users, and follow the setup instructions for the options you choose to implement.
  5. Understand logon format requirements associated with various authentication and authorization methods. See Logging on to Teradata Database.

For information about authentication options for mainframe-based users, see Using External Authentication from Mainframe Clients.