Table of Contents

Search

  1. Preface
  2. Introduction to Dynamic Data Masking Administration
  3. Authentication
  4. Security
  5. Connection Management
  6. JDBC Client Configuration
  7. ODBC Client Configuration
  8. Configuration for MicroStrategy
  9. Access Control
  10. Logs
  11. High Availability
  12. Server Control
  13. Performance Tuning
  14. Troubleshooting
  15. Appendix A: Database Keywords

Administrator Guide

Administrator Guide

Target Database Credentials Management

Target Database Credentials Management

When you configure a target database, the database credentials that you enter are stored in a secure keystore, not in the Dynamic Data Masking Management Console tree. A security provider allows access to the keystore.
The keystore and security provider protect database credentials and prevent unauthorized access to the target database. When you configure a database, you can choose to use either the default keystore or a custom keystore and security provider. If you choose the default keystore, Dynamic Data Masking also uses the default security provider. Both the default keystore and default security provider are preconfigured for use in Dynamic Data Masking. If you choose a custom keystore and security provider, you must configure Dynamic Data Masking for use with the custom keystore and security provider.

0 COMMENTS

We’d like to hear from you!