Verify that you created the connection and security rules correctly.
After you create the rule set, you can use the Security Rule Set Simulator to verify that the rules correctly restrict and mask data. To use the simulator, select the root security rule set node and click
Action
Security Rule Set Simulator
. For more information about the Security Rule Set Simulator, see the
Dynamic Data Masking User Guide
.
You can run a query on the database to view the result set. The following image shows the result set of a query from SQL Developer: