|
|
Archives of the TeradataForum
Message Posted: Mon, 13 Jan 2003 @ 20:09:57 GMT
Subj: | | Re: Data selection |
|
From: | | Doug Drake |
There are likely to be a number of approaches. The one I have seen most often employs the use of views to access ALL tables to be
secured. The view specifies a join to a security table which indicates the items (products, organizations, or whatever) which the user has
access to. You might want to consider the use of profiles (not V2R5 profiles) to simplify management. A profile provides a name or group
that individuals can be associated with. A profile then has certain access rights. The security table then specifies what profile the user
has access to. A profile table then specifies what items it has access to.
Just be aware that there may be a significant performance impact on queries using this approach. Of course, this all depends on how it
is implemented.
Doug Drake
| |