|
Archives of the TeradataForumMessage Posted: Thu, 10 Nov 2016 @ 09:05:35 GMT
Hi Kavitha, I've seen it used at customer sites for tools like Business Objects, Cognos etc. - essentially a situation where you have a middle-tier server that is what logs on to Teradata. This allows the 'real end user' to be identified in Teradata: dbql logs, accessrights etc. Here are some examples from some testing that I use: The 'grant connect through' is as follows: GRANT CONNECT THROUGH server_td_user TO real_end_user WITH ROLE role_for_real_end_user; The 'set query band' is: SET QUERY_BAND = 'proxyuser= real_end_user;' FOR SESSION; In this situation my middle-tier software logs on to Teradata with a userid of 'server_td_user'. To make this a more real example, assume that A user called 'FRED' uses Business Objects to run reports against Teradata. He connects to his Business Objects server with his Windows/Business Objects user name (FRED). The Business Objects server logs on to Teradata with a userid of BOBJ_SERVER. Prior to running a query for this user the Business Objects software runs the following sql request SET QUERY_BAND = 'proxyuser= fred;' FOR SESSION; This proxyuser value ('FRED@) will now be recorded in the main dbqlogtbl (column ProxyUser) for all of these queries. To get this to work, on Teradata you need to: GRANT CONNECT THROUGH bobj_server TO fred; <<< the 'WITH ROLE' is optional Does that help? Cheers, Dave Ward Analytics Ltd - Information in motion (www.ward-analytics.com)
| ||||||||||||||||||||||||||||||||||||||||||||||||
https: | ||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||
Copyright 2016 - All Rights Reserved | ||||||||||||||||||||||||||||||||||||||||||||||||
Last Modified: 24 Jul 2020 | ||||||||||||||||||||||||||||||||||||||||||||||||