As with any RDBMS the database needs to be security and accessible. Teradata is no exception and requires workstation and mainframe access to be configured using the communication methods provided by Teradata. The database also needs to be secured to ensure only authorized users can access it. This is provided through user accounts, privileges, profiles, and roles. This course will describe the workstation and mainframe attachment communication methods. It will also discuss and show how to configure security, including authorization and authentication for a database.
individuals looking to understand the features functions, and benefits of a Teradata database