0 - 21 of 21 tags for security

Here are the instructions for editing Ports and security groups on an AWS Instance.

Lightweight Directory Access Protocol (LDAP) directory integration and Single Sign-on (SSO) are two separate, distinct, and often confusing technologies for external authentication and authorization of user access to a Teradata system. Properly used, these technologies play an important role in the effective integration of Teradata systems with corporate security processes and infrastructure.

This session provides a technical overview of Teradata Secure Zones and shows you how easy it is to implement a zone through a hands-on demo.

Defense in depth is the practice of implementing multiple layers of security to protect business-critical information.

Many industry regulations, standards, and policies mandate the use of strong encryption to meet various security requirements.

Hi All,

Currently we are in development phase of a new data warehouse for a telecom giant according to cLDM 12 data model.
Our next plan is to design & build a scemantic layer on top of this new data warehouse.
 

Processes for integrating security controls were underdeveloped in early versions of Hadoop because data protection needs in its ecosystem were not well-understood.

Row-Level Security

This feature was introduced in Teradata Database 14.00.

Hi Folks
I am working on putting in place security procedures for a Data Warehouse.
I have come across a very useful article here :-

Security of data warehouse assets is a primary concern for most enterprises. This course focuses on securing network access to a Teradata data warehouse. This is Part 2 of 2.

This course focuses on securing network access to a Teradata data warehouse. This is Part 1 of 2.

Teradata Data Mover (version 13.10) introduced job level security management which allows users to specify access rights at job level. Through the Teradata Data Mover Portlet, a Viewpoint user with access to Data Mover Portlet can grant/revoke access rights of individual Data Mover job to other Viewpoint users with access to Data Mover portlet. 

Have you ever wanted to keep your Teradata Database passwords private and not be exposed in scripts?  If you have, then we have a solution for you.

We have a stored procedure which will look at a table and collect statistics on different columns and indexes based on types etc.  We use this inside of other stored procedures after loading staging tables.

For some reason I keep getting the following error:

One of the biggest benefits of Query Banding is the ability to pass parameters into an SQL script.

Establishing an associative security table lookup between a userid and allowable company codes may allow easy access to the base data tables.  

I see that it is possible to force users to periodically change their password via profiles (DBC.PROFILES.EXPIREPASSWORD) or at the system level (DBC.SYSSECDEFAULTS).

Is there a command that can be issued to force a password change after a user is first created or anytime their password is reset by an administrator?

So you have Viewpoint installed and you are logged in for the first time, a blank Viewpoint pane stares back at you ... Now what?

We're happy to announce that we have now enabled HTTPS support for the more sensitive parts of the site. Specifically, you'll be switched to HTTPS when you register, sign-in, get a password reminder, or update your profile.

The following series of articles talk about how portal and portlet security is handled within Viewpoint.  They also describe how to implement security and permissions within your portlet.

Middle-tier applications may stand between end-users and Teradata Database; accepting requests from users, constructing queries from those requests, passing the queries to the database, and then returning results to the users.