37. Quick Start for SQL Databases

The following sections from Quick Start to Privacy dashboard are for SQL databases such as:

ORACLE
DB2 LUW
DB2 z/OS
PostgreSQL
MS-SQL Server
SAP HANA
MySQL
MySQL Aurora

The following example shows the procedure to deploy a PostgreSQL. This is a general procedure and is applicable for all the databases listed above.

Deploying the Data Masking Module

Procedure to deploy the Data Masking Module:

  1. Adding a Data Source

  2. Creating an Environment

  3. Performing a Sensitive Data Search

  4. Manual Editing the Masking Configuration

  5. Data Masking and Progress Monitoring

Adding a Data Source

To add a Data Source:

  1. On the navigation bar, click Data Sources.

  2. Click Add Data Source.

3. Select source data type.

image-20240215-082540.png

4. Fill in the data source details.

image-20240215-082601.png

In case of Oracle connection, you can use the “Wallet” field to load a wallet file. The wallet file will be uploaded from your browser and will be automatically used when connecting to the Oracle database.

5. Enter Advanced Parameters if necessary.

In all dialog boxes, an asterisk * next to a label on the left is used to identify a mandatory user input.

6. Click Test Connection to verify that the connection to the new data source is valid.

7. Check Create Environment to automatically create an environment that includes all schemes of this data source.

8. Click Add.

Creating an Environment

To create an environment:

  1. On the navigation bar, click Environments.

To add a new environment:

a. Click Add Environment.

2. Fill in the environment details:

a. In Environment name, provide a name.
b. Under Data Sources, select the data source for the new environment.
c. Under Schemes, select the data source schemes that the environment will use, or click Select All to include all schemes of the selected data source.

3. For specific tables from Schemas:
a. In Data Sources, select a data source.
b. In Schemes, click Select Tables.

c. Clear the checkbox for a table not to be included.

d. Click Submit.
e. Click Add.

Performing a Sensitive Data Search

To perform a new sensitive data search:

  1. On the navigation bar, click Sensitive Search.

  2. Select the required environment for searching for sensitive data.

3. Click Scan.

4. In the Search Sensitive Data window, configure the search parameters.

5. Select the Auto Refresh checkbox to have the system refresh automatically before doing a scan.

6. Select the Incremental checkbox to include columns that were found in a scan done before to be in the search results for this scan.

  1. In order to use AI, see 37. Use AI to search for sensitive data

8. Click Search.

To stop the search

  1. Click Stop.

View results

After the scan is complete, the scan summary appears.

Manual Editing the Masking Configuration

To manually edit the masking configuration:

  1. On the navigation bar, click Masking Editor.

  2. Select the required environment.

3. Select the required table for which you want to assign a masking rule.

4. The main panel displays the masking rules currently applied to the columns in the table selected.

 

To select another/new masking rule:

  1. For the required column, click on the “Folder”.

2. Click the required masking rule and click Select.

Data Masking and Progress Monitoring

To mask the environment:

  1. Click Mask.

2. Fill in the masking details and click Mask.

3. Enter Advanced Parameters if necessary.

 

4. Once masking is running, the Progress Monitor appears.

 

5. To see the progress in other environments use the drop-down list of environments.