37. Quick Start for SQL Databases
The following sections from Quick Start to Privacy dashboard are for SQL databases such as:
ORACLE
DB2 LUW
DB2 z/OS
PostgreSQL
MS-SQL Server
SAP HANA
MySQL
MySQL Aurora
The following example shows the procedure to deploy a PostgreSQL. This is a general procedure and is applicable for all the databases listed above.
Return to 36. Privacy DashboardUNDEFINED .
Continue to 37. Managing Data Sources.
Deploying the Data Masking Module
Procedure to deploy the Data Masking Module:
Adding a Data Source
Creating an Environment
Performing a Sensitive Data Search
Manual Editing the Masking Configuration
Data Masking and Progress Monitoring
Adding a Data Source
To add a Data Source:
On the navigation bar, click Data Sources.
Click Add Data Source.
3. Select source data type.
4. Fill in the data source details.
In case of Oracle connection, you can use the “Wallet” field to load a wallet file. The wallet file will be uploaded from your browser and will be automatically used when connecting to the Oracle database.
5. Enter Advanced Parameters if necessary.
In all dialog boxes, an asterisk * next to a label on the left is used to identify a mandatory user input.
6. Click Test Connection to verify that the connection to the new data source is valid.
7. Check Create Environment to automatically create an environment that includes all schemes of this data source.
8. Click Add.
Creating an Environment
To create an environment:
On the navigation bar, click Environments.
To add a new environment:
a. Click Add Environment.
2. Fill in the environment details:
a. In Environment name, provide a name.
b. Under Data Sources, select the data source for the new environment.
c. Under Schemes, select the data source schemes that the environment will use, or click Select All to include all schemes of the selected data source.
3. For specific tables from Schemas:
a. In Data Sources, select a data source.
b. In Schemes, click Select Tables.
c. Clear the checkbox for a table not to be included.
d. Click Submit.
e. Click Add.
Performing a Sensitive Data Search
To perform a new sensitive data search:
On the navigation bar, click Sensitive Search.
Select the required environment for searching for sensitive data.
3. Click Scan.
4. In the Search Sensitive Data window, configure the search parameters.
5. Select the Auto Refresh checkbox to have the system refresh automatically before doing a scan.
6. Select the Incremental checkbox to include columns that were found in a scan done before to be in the search results for this scan.
In order to use AI, see 37. Use AI to search for sensitive data
8. Click Search.
To stop the search
Click Stop.
View results
After the scan is complete, the scan summary appears.
Manual Editing the Masking Configuration
To manually edit the masking configuration:
On the navigation bar, click Masking Editor.
Select the required environment.
3. Select the required table for which you want to assign a masking rule.
4. The main panel displays the masking rules currently applied to the columns in the table selected.
To select another/new masking rule:
For the required column, click on the “Folder”.
2. Click the required masking rule and click Select.
Data Masking and Progress Monitoring
To mask the environment:
Click Mask.
2. Fill in the masking details and click Mask.
3. Enter Advanced Parameters if necessary.
4. Once masking is running, the Progress Monitor appears.
5. To see the progress in other environments use the drop-down list of environments.