You can unmask previously consistently tokenized columns that were protected using the
Access Policy transformation.
You might wish to allow select users to reverse de-identifications applied through the Access
Policy transformation and access identifiable data.
For example, when you perform anti-money laundering analysis, you might detect an anomaly. In
order to follow up on the anomaly, you allow an authorized user to unmask the account and
account holder information.