Table of Contents

Search

  1. Preface
  2. Working with Transformations
  3. Aggregator Transformation
  4. Custom Transformation
  5. Custom Transformation Functions
  6. Data Masking Transformation
  7. Data Masking Examples
  8. Expression Transformation
  9. External Procedure Transformation
  10. Filter Transformation
  11. HTTP Transformation
  12. Identity Resolution Transformation
  13. Java Transformation
  14. Java Transformation API Reference
  15. Java Expressions
  16. Java Transformation Example
  17. Joiner Transformation
  18. Lookup Transformation
  19. Lookup Caches
  20. Dynamic Lookup Cache
  21. Normalizer Transformation
  22. Rank Transformation
  23. Router Transformation
  24. Sequence Generator Transformation
  25. Sorter Transformation
  26. Source Qualifier Transformation
  27. SQL Transformation
  28. Using the SQL Transformation in a Mapping
  29. Stored Procedure Transformation
  30. Transaction Control Transformation
  31. Union Transformation
  32. Unstructured Data Transformation
  33. Update Strategy Transformation
  34. XML Transformations

Transformation Guide

Transformation Guide

Encrypting Storage Tables for Substitution Masking

Encrypting Storage Tables for Substitution Masking

You can use transformation language encoding functions to encrypt storage tables. You need to encrypt storage tables when you have enabled storage encryption.
  1. Create a mapping with the IDM_SUBSTITUTION_STORAGE storage table as source.
  2. Create a Data Masking transformation.
  3. Apply the substitution masking technique on the input value and the masked value ports.
  4. Use the following expression on the INPUTVALUE port:
    Enc_Base64(AES_Encrypt(INPUTVALUE, Key))
  5. Use the following expression on the MASKEDVALUE port:
    Enc_Base64(AES_Encrypt(MASKEDVALUE, Key))
  6. Link the ports to the target.

0 COMMENTS

We’d like to hear from you!