Security Information

If you would like to contact the information security department at Teradata, please email and someone will respond to you.

Product Signing Keys

Below you will find the keys we use to sign our software packages. The relevant public keys are included in the respective products. You can verify the packages manually using the keys on this page.

RPM Signing Keys

Here you will find the necessary information to validate the authenticity of Teradata RPMs. To manually validate Teradata RPMs, you will first have to import the public key and then you can validate using the rpm command.

Verifying RPMs

1. Download the Teradata GPG public key:

$ curl -o TD-RPM-SIGN-KEY.asc

2. Import the Teradata signing public key:

# rpm --import /path/to/TD-RPM-SIGN-KEY.asc

3. Validate the authenticity of an RPM:

$ rpm --checksig -v <filename>.rpm

The output of this command shows whether the package is signed and which key was used to sign it, for example:

$ rpm --checksig -v <filename>.rpm
      Header V4 RSA/SHA256 Signature, key ID 4b121135: OK
      Header SHA1 digest: OK
      V4 RSA/SHA256 Signature, key ID 4b121135: OK
      MD5 digest: OK.

Release Package Signing

Please do not use package-signing keys to encrypt email messages.

rsa2048/ACB29BA74B121135 2020-07-22: Teradata, Inc.
This key is used for signing all Teradata RPM packages.

  • Location (SLES12+): /etc/pki/teradata/TD-RPM-SIGN-KEY
  • Download: Teradata
  • Download:
  • Fingerprint: 45922D0BAA052775B98AB786ACB29BA74B12113535

Get the latest industry news, technology trends, and data security insights

In part 1 of this 3 part series, we will define some of the commonly used (& misused) terms in the business continuity space & help you navigate what they mean to your organization.

As stakeholder demand for corporate accountability prompts change in the business world, opportunities for companies to capitalize on being sustainable are bigger than ever.

With the COVID-19 epidemic in full swing, the countries that are faring the best are employing large-scale testing and electronic surveillance. But what does this mean for our civil liberties?