In the Data Masking profile, you configure the masking method you want to use, which UDR types and fields you want to mask/unmask, and any masking method-specific settings.
...
- Crypto, which is used for encrypting data with either AES-128 or AES-256. Can be used for both obscuring and unmasking data.
- Database, which is used for storing masked and unmasked data in a database enabling the data to be unmasked at a later stage.
- Hash, which is used for obscuring data only. You will not be able to unmask data using this method.
Creating a Data Masking Profile Using the Crypto Method
To create a Data Masking profile using Crypto:
...
If you want to specify a directly configured key, select Derive Key from Passphrase and see the section below, Configuring the Crypto Method using Derive Key from Passphrase.
...
Note | ||
---|---|---|
| ||
In order to use AES-256, you need to install Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files on the EC in order to run the workflow. See http://www.oracle.com/technetwork/java/javase/downloads/jce8-download-2133166.html for further information. |
Configuring the Crypto Method using Derive Key from Passphrase
Data Masking Agent - Crypto tab, Derive Key from Passphrase selected
...
- .
...
Note | ||
---|---|---|
| ||
If you use a random passphrase, and the passphrase is changed, you will not be able to unmask any of the data that has been masked before the change. |
...
Configuring the Crypto Method using a Key from a Keystore
If you want a key to be read from a specific Keystore, it must be a JCEKS key store.
...
title | Example - How to create a symmetric crypto key |
---|
...
Data Masking Agent - Crypto tab, Read Key from Keystore selected
...
Creating a Data Masking Profile Using the Database Storage Method
To use the database storage method, you need to create a table to store the mappings between masked and unmasked data. It is important that there are unique indexes for both the masked and unmasked data since the masking method implementation depends on the database constraints to ensure consistency in the table data.
The example below shows what a definition with a single storage field in an Oracle database may be:
Info | ||
---|---|---|
| ||
|
...