Table of Contents

Search

  1. Preface
  2. Introduction
  3. IDD Concepts
  4. Implementation Process
  5. IDD Configuration Manager
  6. Manual IDD Configuration
  7. IDD Global Properties
  8. Appendix A: Sizing and Platform Requirements
  9. Appendix B: Application Components
  10. Appendix C: IDD Security Configuration
  11. Appendix D: Data Security
  12. Appendix E: Example Role-Based Security Configuration
  13. Appendix F: Data Masking
  14. Appendix G: Siperian BPM Workflow Engine
  15. Appendix H: Locale Codes
  16. Appendix I: Troubleshooting
  17. Appendix J: Glossary

Data Director Implementation Guide

Data Director Implementation Guide

Data Masking Overview

Data Masking Overview

This appendix describes the Data Masking mechanism.
This mechanism is used for hiding critical information from IDD users that are not authorized to access that information. For masked fields, IDD replaces part of characters (or all field value) with asterisk (*).
Mask pattern is described in terms of regular expressions. Parts of expression that must be masked are in parenthesis.

0 COMMENTS

We’d like to hear from you!