Confirm Deletion
Are you sure you want to delete the saved search?
Kerberos is an effective authentication protocol built on symmetric-key cryptography. This article describes how to enable Kerberos authentication for Hive and Impala databases in Dynamic Data Masking.
You can use a generic JDBC connection with Dynamic Data Masking. This article describes how you can automate the configuration of a generic JDBC client to work with Dynamic Data Masking. It includes the steps required to configure SQLWorkbench and includes three deployment tools that you can use. You can use the information as a …
This article describes how to use JMX to view Dynamic Data Masking Server event logs in JConsole.
You can configure Dynamic Data Masking to send user activity event logs in a Common Event Format (CEF) format to Secure@Source using a custom logger.
MicroStrategy is a business intelligence tool that includes performance management, dashboards, analysis, and reporting capabilities. This article describes how to capture MicroStrategy user context through Dynamic Data Masking.
You can use Nagios Core to monitor Informatica® Dynamic Data Masking servers on Windows and Linux machines. This article provides instructions for installing and configuring Nagios Core for monitoring Dynamic Data Masking.
In Dynamic Data Masking™ version 9.8.4, the default masking functionality is enhanced in a way that changes its behavior. This H2L provides examples of different types of SQL statements to show the differences between the old and new default masking functionalities.
This article describes how to create a Dynamic Data Masking security rule that captures the SET QUOTED_IDENTIFIER value to prevent a database error when you mask queries in a Sybase or Microsoft SQL Server database.
Use the Security Rule Set Simulator to test security rules and regular expressions for Microsoft Azure SQL Database.
This article describes how to configure IP address binding in Dynamic Data Masking.
This article describes how to create masking and blocking security rules in Dynamic Data Masking and test the rules with the Security Rule Set Simulator.
This article describes how to create a security rule set to limit the rows that a database request returns and to mask the returned data.
This article describes how to configure a Windows 7 or Windows Server 2008 client machine for Dynamic Data Masking when the client connects to the database with an ODBC connection.
This article describes an example architecture, development, and deployment of Dynamic Data Masking Multi-Server architecture.
This article describes how to create a custom logger and appender to log database access that occurs outside of normal business hours.