Introduction to Actian Data Platform Security
Overview of Actian Data Platform Security
The Actian Data Platform Virtual Private Cloud (VPC) Architecture
Storage and Encryption
Data Access and Authentication
Maintenance and Compliance
Data Lifecycle
SOC2 Security Attestation Available
Actian Data Platform Identity and Access Management
Actian Data Platform Security Features
Warehouse Authorization Identifiers
Subject Privileges
Object Permissions
Data at Rest Encryption
Data Storage and Retention
Backup and Recovery Policy
Visit the Actian Security Center
SQL Statements Referenced in This Guide
Authorizing User Access for a Warehouse
Users and Profiles
Working with User Objects
User Expiration Date
User Password
Working with Profile Objects
Example of Using a Profile
Default Profile
Groups and Roles
Groups
Working with Group Objects
Examples: Creating, Altering, and Dropping a Group using SQL Statements
Groups and Permissions
Roles
Working with Role Objects
Examples: Creating, Altering, and Dropping a Role Using SQL Statements
Roles and Permissions
Assigning Privileges and Granting Permissions
Subject Privileges
CHANGE_PASSWORD Privilege
IMA_SEC_READ Privilege
MAINTAIN_USERS Privilege
UNMASK Privilege
Sets of Privileges Associated with a Session
Object Permissions (Grants)
Working with Grants
Object Ownership and Granting Object Permissions
The GRANT Statement
Database Grants
How Database Permissions for a Session are Determined
Database Grant Examples
Table and View Grants
Table Grant Examples
Procedure Grants
Database Event Grants
Role Grants
How Grants Restrict Data Access
Grant Overhead
Multiple Permission Checks
How Privileges for a Session Are Determined
Access to Tables, Views, or Procedures and the Authorization Hierarchy
Access to Databases and the Authorization Hierarchy
How Database Privileges for a Session Are Determined
DBMSINFO--View Permissions for Current Session
Example: Return the Value of Query Row Limit for Current Session
Controlling Access through Database Procedures
Database Procedures
Working with Procedure Objects
How to Implement a Database Procedure
Database Procedure Example
Access Control through Database Procedures
Using Column Masking
Column Masking
Column Masking Example
Glossary
Introduction to Actian Data Platform Security
Glossary