Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The agent uses a profile in which you can define the masking method; Crypto, Database, or Hash, as well as which fields to mask/unmask along with additional settings specific for each masking method. When selecting Database, Oracle, Postgres, and SAP HANA can be used.

In the agent itself, you can select which of the UDR types configured in the used profile(s) that you want the agent to process, as well as how you want the agent to handle unmatching data.

...

  • Encryption/decryption with AES-128 and AES-256
  • Reading a key from a specific JCEKS keystore
  • Generation and storage of replacement data in a Database
  • Converting input data to random data based on SHA-256 hash
  • Use of multiple profiles in the agent
  • Error handling
  • Logging


Scroll ignore
scroll-viewportfalse
scroll-pdftrue
scroll-officefalse
scroll-chmtrue
scroll-docbooktrue
scroll-eclipsehelptrue
scroll-epubtrue
scroll-htmlfalse

The section contains the following subsections: