Teradata Database security is based on the following concepts.
Security Element |
Description |
User |
An individual or group of individuals represented by a single user identity. |
Privileges |
The database privileges explicitly or automatically granted to a user or database. |
Logon |
The process of submitting user credentials when requesting access to the database. |
Authentication |
The process by which the user identified in the logon is verified. |
Authorization |
The process that determines the database privileges available to the user. |
Security Mechanism |
A method that provides specific authentication, confidentiality, and integrity services for a database session. |
Network Traffic Protection |
The process for protecting message traffic between Teradata Database and mainframe-attached and workstation-attached clients against interception, theft, or other form of attack. |
Message Integrity |
Checks data sent across the network against what was received to ensure no data was lost or changed. |
Access Logs |
Logs that provide the history of users accessing the database and the database objects accessed. |
For detailed information on these topics, see Security Administration.