Excerpt |
---|
You open the Data Masking agent configuration dialog from a workflow configuration: double-click the agent icon.
The Data Masking agent configuration
The agent can be set to different masking methods, based on the chosen method a different tab will be available for additional configuration. Depending on the configuration, different Storage Fields can also be added. The mapping of which UDR fields is done in the referenced Data Masking profiles. You have the option of referencing one or several Data Masking Profiles.
...
In the Data Masking profile you configure the masking method you want to use, which UDR types and field you want to mask/unmask, and any masking method specific settings. There are four different masking methods that you can use:
For more information on the supported data types, refer to Supported Data Types. ConfigurationThe Data masking profile consists of five tabs:
Fields TabThe masking method that is selected in the Fields tab determines which of the other |
...
four tabs that will be active |
...
as these tabs contain masking method |
...
specific configurations. Data Masking Profile - Fields tab
|
...
This will use a cryptographic algorithm that can be configured to either derive its key from a passphrase or from a Keystore. The following options are available in the dedicated Crypto tab:
...
The supported random algorithm types for each masking method are as follows:
Crypto TabThis tab is enabled only when the Crypto masking method is selected in the Fields tab. Data Masking Profile - Crypto tab
|
...
|
...
|
...
|
...
|
...
|
...
|
...
|
...
|
...
|
...
Database TabThis tab is enabled only when the Database Storage masking method is selected in the Fields tab. |
...
This option enables database data model masking. By selecting the target database using the Browser button, the view list will be expanded with the appropriate information. In a table view, the following fields will be shown in columns:
...
Data Masking Profile - Database tab
|
...
|
...
|
...
In a separate Advanced section, additional parameters can be configured: the queue size, the maximum number of workers, and the maximum select batch size value.
...
Hash (One way)
...
The one-way hash masking method employs a salt-based encryption scheme. The Salt input box allows for manual entry of the relevant hash, optionally a Random button can be pushed to generate a random entry.
...
Hash/Database
...
Hash TabThis tab is enabled only when the Hash masking method is selected in the Fields tab. Data Masking Profile - Hash tab
Hash/Database TabThis tab is enabled only when the Hash/Database masking method is selected in the Fields tab. Data Masking Profile - Hash/Database tab
The supported data types for each masking method are as follows:
|