Table of Contents

Search

  1. Preface
  2. Introduction to Dynamic Data Masking
  3. Rules
  4. Connection Rules
  5. Security Rules
  6. Security Rule Set Simulator
  7. Masking Functions
  8. Glossary

Rewrite rule action

Rewrite rule action

Security rule action that replaces the SQL statement with an alternate statement.

0 COMMENTS

We’d like to hear from you!