Announcing ADAF MD support for Teradata and further SQL operation coverage

First of all, we add the Teradata Database to the growing list of relational database systems that we support. We have had increased demand for providing strong policy-driven access control capability for Teradata databases, and with this release, we deliver on that request.

In addition, with this release ADAF MD now supports the ability to filter, at the column and row level, the INSERT and UPDATE operations, in addition to the existing support for the SELECT SQL queries. What this means is that you are able to provide the same level of fine-grained access control to the INSERT and UPDATE operations as you were able to for the SELECT (i.e. read) operations on data in these relational databases.

Consider the case where one wants to enforce a policy that states that employees in the HR department of an organization can view all records, except the salary information, of employees if the HR employee belongs to the same region as the employee. In order to view the salary record, the HR employee should also have a “manager” designation. Existing capabilities of ADAF MD make it easy to enforce such attribute based fine-grained access to data, something that is hard to do using traditional database access control systems.

Now consider an additional IT policy which states that only HR managers belonging to the same region as the employee can update the salary record of the employee. Starting from release 1.4 of ADAF MD you can use the same workflow of using your policies in the ABAC-centric XACML language to express and enforce the policy.

For more information on ADAF MD, take a look at the associated product sheet and data sheet.

Other Blogs

3 keys to re-evaluate your authorization management
On May 27, I had the pleasure to join the KuppingerCole KCLive event with several industry peers in a panel discussion about  “Enabling the Future...
How OAuth is related to Attribute Based Access Control
What is Authorization? Authorization, also referred to as Access Control, is the process that follows authentication (which checks your identity and ensures that you are...
Modern Enterprise Authorization Management System
Gartner has an interesting article titled “Modernize Your Runtime Authorization” that highlights some aspects you need from a modern enterprise authorization systems. Over the years...