Assigning Security Profiles to Objects - Teradata Meta Data Services

Teradata Meta Data Services User Guide

Product
Teradata Meta Data Services
Release Number
15.00
Language
English (United States)
Last Update
2018-09-27
Product Category
Teradata Tools and Utilities

Assigning Security Profiles to Objects

You can also assign security profiles to AIMs, classes, and objects in the repository.

Assigning AIM Profiles

1 In the Navigation Pane, expand Administration, Security Management, and then Security Profiles.

2 Click AIM Profile.

The AIM Profiles screen appears.

Figure 15: The AIM Profiles Screen

3 Select the check box next to the AIM name whose security profile you want to change.

4 Select a security profile and click Apply Change.

For detailed instructions, click .

Assigning Class Profiles

1 In the Navigation Pane, expand Administration, Security Management, and then Security Profiles.

2 Click Class Profile.

The Class Profiles screen appears.

Figure 16: The Class Profiles Screen

3 Select the check box next to the Class Name whose security profile you want to change.

4 Select a security profile and click Apply Change.

For detailed instructions, click .

Assigning Object Profiles

1 In the Navigation Pane, expand Administration, Security Management, and then Security Profiles.

2 Click Object Profile.

The Object Profiles screen appears.

Figure 17: The Object Profiles Screen

3 Select the metamodel and class, and click Go to update the display.

You can use the page controls below the object list to navigate through the pages.

4 Make the desired changes and click Apply Change.

For detailed instructions, click .

Related objects are objects that are the destination objects in collections of relationships that have delete propagation flag turned on.

A relationship that has delete propagation flag turned on is called a containment relationship. Propagation will continue until a class object is reached that has no containment relationships.

Most of the DIM relationships are containment relationships. See the following figure:

Figure 18: Containment Relationships

For example, if you change the security profile of a database named Customer and select the Propagate to all Related Objects check box, the security profile will be set in the Customer database object and all Tables, Columns, Views, and so on, associated with that database.