Table of Contents

Search

  1. Preface
  2. Introduction to Dynamic Data Masking
  3. Rules
  4. Connection Rules
  5. Security Rules
  6. Security Rule Set Simulator
  7. Masking Functions
  8. Glossary

Working with the Security Rule Set Simulator

Working with the Security Rule Set Simulator

You can choose to run the Security Rule Set Simulator without a database or a database user.
When you run the Security Rule Set Simulator, you enter a database name and database user login information. To receive authentic results, Informatica recommends that you enter a privileged user name and password when you run the Security Rule Set Simulator. If you choose to run the simulator without database information, the simulator displays the log output with a warning that you did not specify the database or database user.
Some SQL requests require the Dynamic Data Masking Server to access the database. To receive accurate log output, you must define the database and the user name and password of a privileged user in the simulator. The following types of requests require the Dynamic Data Masking Server to access the database:
  • Security rules that use the PL/SQL rule matcher
  • SQL statements that contain an asterisk (*)
  • Requests that retrieve information about the case sensitivity of the database