Confirm Deletion
Are you sure you want to delete the saved search?
The Informatica Dynamic Data Masking Release Guide is written for system administrators who are responsible for the configuration of Dynamic Data Masking. This guide assumes that you have knowledge of your operating systems, relational database concepts, and the database engines in your environment. The Informatica Dynamic Data Masking …
This document contains important information about installation, fixed limitations, and known limitations for Dynamic Data Masking.
The Active Directory Accelerator Guide contains information to help administrators use the Active Directory accelerator to implement Dynamic Data Masking for an LDAP directory. This guide assumes that you have knowledge of Dynamic Data Masking.
The Data Archive Accelerator Guide contains information to help Data Archive administrators use the Data Archive accelerator to implement Dynamic Data Masking for Data Vault. This guide assumes that you have knowledge of Data Archive.
Dynamic Data Masking Accelerator for use with SAP contains information to help administrators use the accelerator to implement Dynamic Data Masking with an SAP application. This guide assumes that you have knowledge of Dynamic Data Masking.
Log Loader contains information to help administrators use the Log Loader to export Dynamic Data Masking log information into database objects. This guide assumes that you have knowledge of Dynamic Data Masking.
The Siebel Accelerator Guide contains information to help administrators use the Siebel accelerator to implement Dynamic Data Masking for an Oracle database configured for Siebel. This guide assumes that you have knowledge of Dynamic Data Masking.
The Stored Procedure Accelerator Guide for DB2 contains information to help administrators use the stored procedure accelerator to implement Dynamic Data Masking for stored procedures and user-defined table functions in a DB2 database. This guide assumes that you have knowledge of Dynamic Data Masking.
The Stored Procedure Accelerator Guide for Microsoft SQL Server contains information to help administrators use the stored procedure accelerator to implement Dynamic Data Masking for stored procedures and table-valued functions in a Microsoft SQL Server database. This guide assumes that you have knowledge of Dynamic Data Masking.
The Stored Procedure Accelerator Guide for Oracle contains information to help administrators use the stored procedure accelerator to implement Dynamic Data Masking for stored procedures and table-valued functions in an Oracle database. This guide assumes that you have knowledge of Dynamic Data Masking.
The Stored Procedure Accelerator Guide for Sybase contains information to help administrators use the stored procedure accelerator to implement Dynamic Data Masking for stored procedures in a Sybase ASE database. This guide assumes that you have knowledge of Dynamic Data Masking.
The Transparent Archive Guide contains information to help administrators implement Transparent Archive for Informatica Data Archive Data Vault and Dynamic Data Masking. This guide assumes that you have knowledge of Data Archive and Data Vault.
The Informatica Dynamic Data Masking User Guide describes how to implement Dynamic Data Masking to protect sensitive information in a production environment. This guide assumes that you have knowledge of your operating systems and relational database systems, which includes the database engines, flat files, and mainframe systems in your environment.
The Informatica Dynamic Data Masking Administrator Guide contains information to help administrators manage and configure Dynamic Data Masking. This guide assumes that you have knowledge of your operating systems and relational database systems, which includes the database engines, flat files, and mainframe systems in your environment.
The Informatica Dynamic Data Masking Installation Guide is written for system administrators who are responsible for the installation or upgrade of Dynamic Data Masking. This guide assumes you have knowledge of your operating systems, relational database concepts, and the database engines in your environment.
This article describes how to create a Dynamic Data Masking security rule that captures the SET QUOTED_IDENTIFIER value to prevent a database error when you mask queries in a Sybase or Microsoft SQL Server database.
In Dynamic Data Masking™ version 9.8.4, the default masking functionality is enhanced in a way that changes its behavior. This H2L provides examples of different types of SQL statements to show the differences between the old and new default masking functionalities.
Use the Security Rule Set Simulator to test security rules and regular expressions for Microsoft Azure SQL Database.
This article describes how to configure IP address binding in Dynamic Data Masking.
This article describes how to create masking and blocking security rules in Dynamic Data Masking and test the rules with the Security Rule Set Simulator.
This article describes how to create a security rule set to limit the rows that a database request returns and to mask the returned data.
You can use a generic JDBC connection with Dynamic Data Masking. This article describes how you can automate the configuration of a generic JDBC client to work with Dynamic Data Masking. It includes the steps required to configure SQLWorkbench and includes three deployment tools that you can use. You can use the information as a …
This article describes how to use JMX to view Dynamic Data Masking Server event logs in JConsole.
You can configure Dynamic Data Masking to send user activity event logs in a Common Event Format (CEF) format to Secure@Source using a custom logger.
MicroStrategy is a business intelligence tool that includes performance management, dashboards, analysis, and reporting capabilities. This article describes how to capture MicroStrategy user context through Dynamic Data Masking.
You can use Nagios Core to monitor Informatica® Dynamic Data Masking servers on Windows and Linux machines. This article provides instructions for installing and configuring Nagios Core for monitoring Dynamic Data Masking.
Kerberos is an effective authentication protocol built on symmetric-key cryptography. This article describes how to enable Kerberos authentication for Hive and Impala databases in Dynamic Data Masking.
This article describes how to configure a Windows 7 or Windows Server 2008 client machine for Dynamic Data Masking when the client connects to the database with an ODBC connection.
This article describes an example architecture, development, and deployment of Dynamic Data Masking Multi-Server architecture.
This article describes how to create a custom logger and appender to log database access that occurs outside of normal business hours.