![]()  |  
 
 
 | 
Archives of the TeradataForumMessage Posted: Thu, 10 Nov 2016 @ 09:05:35 GMT
 
 Hi Kavitha, I've seen it used at customer sites for tools like Business Objects, Cognos etc. - essentially a situation where you have a middle-tier server that is what logs on to Teradata. This allows the 'real end user' to be identified in Teradata: dbql logs, accessrights etc. Here are some examples from some testing that I use: The 'grant connect through' is as follows: 
     GRANT CONNECT THROUGH server_td_user TO real_end_user  WITH ROLE role_for_real_end_user;
The 'set query band' is: 
     SET QUERY_BAND = 'proxyuser= real_end_user;' FOR SESSION;
In this situation my middle-tier software logs on to Teradata with a userid of 'server_td_user'. To make this a more real example, assume that A user called 'FRED' uses Business Objects to run reports against Teradata. He connects to his Business Objects server with his Windows/Business Objects user name (FRED). The Business Objects server logs on to Teradata with a userid of BOBJ_SERVER. Prior to running a query for this user the Business Objects software runs the following sql request 
     SET QUERY_BAND = 'proxyuser= fred;' FOR SESSION;
This proxyuser value ('FRED@) will now be recorded in the main dbqlogtbl (column ProxyUser) for all of these queries. To get this to work, on Teradata you need to: 
     GRANT CONNECT THROUGH bobj_server TO fred;   <<< the 'WITH ROLE' is optional
Does that help? Cheers, Dave Ward Analytics Ltd - Information in motion (www.ward-analytics.com) 
  | ||||||||||||||||||||||||||||||||||||||||||||||||
|   | https: | |||||||||||||||||||||||||||||||||||||||||||||||
 
  | ||||||||||||||||||||||||||||||||||||||||||||||||
|  
 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Copyright 2016 - All Rights Reserved | ||||||||||||||||||||||||||||||||||||||||||||||||
| Last Modified: 24 Jul 2020 | ||||||||||||||||||||||||||||||||||||||||||||||||