Table of Contents

Search

  1. Preface
  2. Introduction
  3. IDD Concepts
  4. Implementation Process
  5. IDD Configuration Manager
  6. Manual IDD Configuration
  7. IDD Global Properties
  8. Appendix A: Sizing and Platform Requirements
  9. Appendix B: Application Components
  10. Appendix C: IDD Security Configuration
  11. Appendix D: Data Security
  12. Appendix E: Example Role-Based Security Configuration
  13. Appendix F: Data Masking
  14. Appendix G: Siperian BPM Workflow Engine
  15. Appendix H: Locale Codes
  16. Appendix I: Troubleshooting
  17. Appendix J: Glossary

Data Director Implementation Guide

Data Director Implementation Guide

Sample Patterns

Sample Patterns

The following examples show sample patterns.
Mask whole field value:
(.+)
Mask all but last three characters:
(.+)…
Leave unmasked first four characters:
….(.+)
Pattern that hides five first characters then leave unmasked three, then hides rest of value except last four characters:
(.{5})…(.+)….
If the specified pattern does not matched field value, then the whole value is masked. For example string "ABS" doesn't match pattern
(.+)…
because it expects at least four characters (one at the beginning to be masked and three at the end to be left unmasked). In this case "ABS" is replaced with
"***"
.

0 COMMENTS

We’d like to hear from you!