Defining Security Labels for Users/Rows | Teradata Vantage - Defining Security Labels for Users and Rows - Advanced SQL Engine - Teradata Database

Security Administration

Product
Advanced SQL Engine
Teradata Database
Release Number
17.05
17.00
Published
September 2020
Language
English (United States)
Last Update
2021-01-23
dita:mapPath
ied1556235912841.ditamap
dita:ditavalPath
lze1555437562152.ditaval
dita:id
B035-1100
lifecycle
previous
Product Category
Teradata Vantageā„¢
Before implementing row level security, you should define the security classification systems and associated labels required to support your site security policy.
  1. Define each classification system and identify the labels in the system.

    Each system is the basis for a security CONSTRAINT object, which defines a set of access controls. Each user can be assigned up to 6 hierarchical and 2 non-hierarchical constraints.

  2. For each table requiring RLS protection, determine which of the classification system (security constraints) should apply to the range of users who access the table.

    A table can contain up to 5 constraint columns.

  3. Identify how security labels for each system should apply to table rows, and define the user access level required to perform each SQL operation (INSERT, SELECT, UPDATE, and DELETE).

    You can use this analysis to help:

    • Determine the level of protection required for each row
    • Define the SQL access rules used in creating security constraint UDFs
    • Determine which UDFs should be used in a security CONSTRAINT object