Hi, I'm Ask INFA!
What would you like to know?
ASK INFAPreview
Please to access Ask INFA.

Table of Contents

Search

  1. Preface
  2. Working with Transformations
  3. Address Validator Transformation
  4. Aggregator Transformation
  5. Association Transformation
  6. Bad Record Exception Transformation
  7. Case Converter Transformation
  8. Classifier Transformation
  9. Cleanse transformation
  10. Comparison Transformation
  11. Custom Transformation
  12. Custom Transformation Functions
  13. Consolidation Transformation
  14. Data Masking Transformation
  15. Data Masking Examples
  16. Decision Transformation
  17. Duplicate Record Exception Transformation
  18. Dynamic Lookup Cache
  19. Expression Transformation
  20. External Procedure Transformation
  21. Filter Transformation
  22. HTTP Transformation
  23. Identity Resolution Transformation
  24. Java Transformation
  25. Java Transformation API Reference
  26. Java Expressions
  27. Java Transformation Example
  28. Joiner Transformation
  29. Key Generator Transformation
  30. Labeler Transformation
  31. Lookup Transformation
  32. Lookup Caches
  33. Match Transformation
  34. Match Transformations in Field Analysis
  35. Match Transformations in Identity Analysis
  36. Merge Transformation
  37. Normalizer Transformation
  38. Parser Transformation
  39. Rank Transformation
  40. Router Transformation
  41. Sequence Generator Transformation
  42. Sorter Transformation
  43. Source Qualifier Transformation
  44. SQL Transformation
  45. Using the SQL Transformation in a Mapping
  46. Stored Procedure Transformation
  47. Standardizer Transformation
  48. Transaction Control Transformation
  49. Union Transformation
  50. Unstructured Data Transformation
  51. Update Strategy Transformation
  52. Weighted Average Transformation
  53. XML Transformations

Transformation Guide

Transformation Guide

Applying Masking Rules

Applying Masking Rules

Apply masking rules based on the source datatype. When you click a column property on the Masking Properties tab, the Designer displays masking rules based on the datatype of the port.
The following table describes the masking rules that you can configure based on the masking type and the source datatype:
Masking Types
Source Datatype
Masking Rules
Description
Random and Key
String
Mask Format
Mask that limits each character in an output string to an alphabetic, numeric, or alphanumeric character.
Random and Key
String
Source String Characters
Set of source characters to mask or to exclude from masking.
Random and Key
String
Result String Replacement Characters
A set of characters to include or exclude in a mask.
Random
Numeric
String
Date/Time
Range
A range of output values.
  • Numeric. The Data Masking transformation returns numeric data between the minimum and maximum values.
  • String. Returns a string of random characters between the minimum and maximum string length.
  • Date/Time. Returns a date and time within the minimum and maximum datetime.
Random
Numeric
Date/Time
Blurring
Range of output values with a fixed or percent variance from the source data. The Data Masking transformation returns data that is close to the value of the source data. Datetime columns require a fixed variance.

0 COMMENTS

We’d like to hear from you!