16.10 - User Implementation Process - Teradata Database

Teradata Database Security Administration

prodname
Teradata Database
vrm_release
16.10
created_date
June 2017
category
Administration
Security
featnum
B035-1100-161K
  1. Assign users to functional groups to help assess user setup needs. See About Database User Functional Categories.
  2. Use profiles to set user parameters, such as space allocations, password control settings, and security constraint assignments. See Working with Database Profiles.
  3. Review the database user types shown in About Database User Types and determine which of them apply to your authentication and authorization strategy. The method for creating users and defining their database privileges varies by user type.
  4. Create the required users:
  5. Review About Teradata Database User Privileges to understand which privileges you must grant and which are acquired indirectly.
  6. Assign user privileges:
  7. Review additional methods for restricting access based on the structure of the database and its component parts. See Other Options for Limiting Database Access.