Excerpt | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
In the Data Masking profile you configure the masking method you want to use, which UDR types and field you want to mask/unmask, and any masking method specific settings. There are four different masking methods that you can use:
For more information on the supported data types, refer to Supported Data Types. ConfigurationThe Data masking profile consists of five tabs:
Fields TabThe masking method that is selected in the Fields tab determines which of the other four tabs that will be active as these tabs contain masking method specific configurations. Data Masking Profile - Fields tab
|
...
|
...
|
...
|
...
|
...
|
...
The supported random algorithm types for each masking method are as follows:
Crypto TabThis tab is enabled only when the Crypto masking method is selected in the Fields tab. Data Masking Profile - Crypto tab
|
To use the AES-256 algorithm, you are required to install the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files on the EC in order to run the workflow. See JCE Unlimited Strength Jurisdiction Policy Files for JDK/JRE 8 Download (oracle.com) for further information.
|
...
Database TabThis tab is enabled only when the Database Storage masking method is selected in the Fields tab. Data Masking Profile - Database tab
|
...
|
...
|
...
|
...
Hash TabThis tab is enabled only when the Hash masking method is selected in the Fields tab. Data Masking Profile - Hash tab
Hash/Database TabThis tab is enabled only when the Hash/Database masking method is selected in the Fields tab. Data Masking Profile - Hash/Database tab
|
...
|
...
|
...
|
...
|
...
|
...
The supported data types for each masking method are as follows:
|