Table of Contents

Search

  1. Preface
  2. Introduction to Dynamic Data Masking Administration
  3. Authentication
  4. Security
  5. Connection Management
  6. JDBC Client Configuration
  7. ODBC Client Configuration
  8. Configuration for MicroStrategy
  9. Access Control
  10. Logs
  11. High Availability
  12. Server Control
  13. Performance Tuning
  14. Troubleshooting
  15. Appendix A: Database Keywords

Administrator Guide

Administrator Guide

Implementation Scenarios

Implementation Scenarios

Dynamic Data Masking as a Single Point of Failure

The following diagram shows an example implementation where the Teradata instance details are configured on the same machine where Dynamic Data Masking is installed. In this scenario, the client sends a request to Dynamic Data Masking and Dynamic Data Masking creates the InetSocketAddress object.

Dynamic Data Masking and Teradata Installed Together

The following diagram shows an example of an implementation where the Teradata instance and Dynamic Data Masking are installed together at each node. The client sends a request to Dynamic Data Masking and Dynamic Data Masking creates the InetSocketAddress object.
You can create the host configuration file, which contains details of the COP host names and corresponding IP addresses, either with or without the domain name. For example:
10.65.42.233 INSUTD14ILM261cop2
and
10.65.42.233 INSUTD14ILM261cop2.informatica.com
are equivalent entries in the host configuration file.

Multiple Dynamic Data Masking Nodes

The following diagram shows an example of an implementation with multiple installations of Dynamic Data Masking to handle failover. Each Dynamic Data Masking instance contains details of multiple Teradata instances.

0 COMMENTS

We’d like to hear from you!