Books
in black and white
Main menu
Share a book About us Home
Books
Biology Business Chemistry Computers Culture Economics Fiction Games Guide History Management Mathematical Medicine Mental Fitnes Physics Psychology Scince Sport Technics
Ads

Teradata RDBMS Database Administration - NCR

NCR Teradata RDBMS Database Administration - NCR , 2004. - 616 p.
Download (direct link): teradatadatabaseadmin2004.pdf
Previous << 1 .. 4 5 6 7 8 9 < 10 > 11 12 13 14 15 16 .. 218 >> Next


Resource Management...............................................................................................5-39

Chapter 6: Controlling Access

Access Privileges..............................................................................................................6-2

Ownership Privileges...................................................................................................6-2

Granting Privileges.......................................................................................................6-4

Privileges To and From PUBLIC...................................................................................6-7

Granting Access Rights to PUBLIC............................................................................6-7

Revoking Granted Rights from PUBLIC...................................................................6-7

Access Rights Validation................................................................................................6-8

Viewing Granted Privileges...........................................................................................6-9

GRANT Statement......................................................................................................... 6-11

REVOKE Statement....................................................................................................... 6-13

Affects on DBC.AccessRights System Table...........................................................6-13

Hierarchical Considerations.....................................................................................6-14

Controlling Inherited and Group Privileges.............................................................6-15

Inherited Privileges....................................................................................................6-15

Using Roles..................................................................................................................6-15

xxviii

Teradata RDBMS Database Administration Contents

Transferring Privileges.................................................................................................6-16

Controlling System Access...........................................................................................6-17

Controlling Password Security....................................................................................6-20

Securing Access with Passwords.............................................................................6-20

Creating a Password..................................................................................................6-20

Tracking Changes to Passwords..............................................................................6-21

Customizing Your Password Controls....................................................................6-21

Updating the Global Security Defaults..................................................................6-22

Password Encryption.................................................................................................6-23

Host Logon Control...................................................................................................6-23

Using GRANT LOGON/REVOKE LOGON Statements.....................................6-24

Programming Logon and Security Exits in the

Teradata Director Program (TDP).........................................................................6-25

Implementing Single Sign On (SSO) (Windows 2000 Only)................................6-25

Session-Related Views..................................................................................................6-30

DBC.SessionInfo View...............................................................................................6-30

DBC.LogOnOff View.................................................................................................6-34

DBC.LogonRules View..............................................................................................6-34

DBC.SW_Event_Log.....................................................................................................6-36

Access Control Mechanisms........................................................................................6-37

Granting or Revoking Privileges.............................................................................6-37

Space Allocation Scenario.........................................................................................6-38

Limiting Data Access with Views...............................................................................6-39

Updating Tables Through a View............................................................................6-40

Example of an Exclusion View.................................................................................6-40

Example of Renaming Table Columns in a View..................................................6-40
Previous << 1 .. 4 5 6 7 8 9 < 10 > 11 12 13 14 15 16 .. 218 >> Next