Table of Contents

Search

  1. Preface
  2. Introduction to Dynamic Data Masking
  3. Rules
  4. Connection Rules
  5. Security Rules
  6. Security Rule Set Simulator
  7. Masking Functions
  8. Glossary

rule

rule

The conditions and actions that you want to apply to a request. A rule can be a security rule or a connection rule. You can create an individual rule or create a rule as part of a rule folder. A rule consists of a matcher, action, and processing action

0 COMMENTS

We’d like to hear from you!