Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The agent uses a profile in which you can define masking method; Crypto, Database, or Hash, as well as which fields to mask/unmask along with additional settings specific for each masking method. When selecting Database, Oracle, Postgres, and SAP HANA can be used.

In the agent itself you can select which of the UDR types configured in the used profile(s) that you want the agent to process, as well as how you want the agent to handle unmatching data.

...

  • Encryption/decryption with AES-128 and AES-256
  • Reading a key from a specific JCEKS keystore
  • Generation and storage of replacement data in a Database
  • Converting input data to random data based on SHA-256 hash
  • Use of multiple profiles in the agent
  • Error handling
  • Logging

...