Table of Contents

Search

  1. Preface
  2. Introduction to Dynamic Data Masking Administration
  3. Authentication
  4. Security
  5. Connection Management
  6. JDBC Client Configuration
  7. ODBC Client Configuration
  8. Configuration for MicroStrategy
  9. Access Control
  10. Logs
  11. High Availability
  12. Server Control
  13. Performance Tuning
  14. Troubleshooting
  15. Appendix A: Database Keywords

Administrator Guide

Administrator Guide

Greenplum Connections

Greenplum Connections

Configure database privileges and impersonation and cleanup commands for a Greenplum database.
The required user privileges and commands for impersonation and cleanup vary based on the database and database version. The following privileges and commands are examples that work for some versions of the database.

Impersonation Commands

You might enter the following commands in the
Impersonation Commands
text box for a Greenplum database:
SET ROLE \(AUTH_USERNAME) SET SEARCH_PATH = \(AUTH_CURRENT_SCHEMA)

Required Database Privileges

The Dynamic Data Masking administrator must have the following privilege:
GRANT <client_username> TO <ddm_username>
The database user that Dynamic Data Masking impersonates must have the following privilege:
GRANT SELECT ON TABLE <tablename> TO <client_username>;

Cleanup Commands

You might enter the following commands in the
Cleanup Commands
text box for a Greenplum database:
RESET ROLE; RESET SEARCH_PATH;

0 COMMENTS

We’d like to hear from you!