|
|
Archives of the TeradataForum
Message Posted: Mon, 03 Jun 2002 @ 15:46:06 GMT
Subj: | | Re: Teradata Security Question |
|
From: | | Mike Vanole |
Jim,
This is a clever approach and merits serious consideration. We currently use account strings at the tool layer via odbc, or whatever to
see how a person is using the system - we could use both. Business Objects is only an example. We use it and several other tools, including
MSI, and homegrown tools, but this would work nicely all the way around, and fit with all of our other security measures and
requirements.
To respond to Al Lee: This can be done by defining new hostids (reconfig), then grant/revoke logon access to those hosts, but you still
can't tie a database to a hostid. Once that user is logged on they still have access to the database.
| |