Introduction to Data Access Management
How data access policies and rules protect your data
Data access policy enforcement methods
Data access policy process
Before you begin
Data access policies
Data access policy selection
Guidelines for sequencing data access policies for application
Data access control policy prerequisites
Data access control policy permission mappings
Creating data access policies
Adding a condition to a data access policy
Creating data access control rules
Assigning permissions to source systems
Data filter policy behavior
Creating data filter rules
Creating filters for data filter rules
Default data de-identifications
Creating data de-identification rules
Creating cell-level de-identifications
Precedence tiers
Creating precedence tiers
Data protections
Creating data protections
Creating default data protections
De-identification techniques
Constant value
Generalize date
Hashing
Redact with null
Retain
Substitute value
Tokenize
Truncate
Data access asset lifecycle
Publishing a data access asset
Audit events
Data access asset history
Writing audit events to disk
Regular expression syntax reference
Unicode character support
Any character
Character ranges
Complement operators
Concatenation
Escape syntax
Intersections
Literals
Numeric ranges
Optional elements
Repeated elements
Unions
Data Types
Introduction to Data Access Management
Data Types
infa.cdlg.pages.cdam
infa.cdlg.pages.home.dialog.dataAccessControlPrerequisites
infa.cdlg.pages.home.dialog.dataAccessControlMappings
infa.cdlg.pages.home.dialog.createNewDataAccessControlAsset
infa.cdlg.pages.home.dialog.createNewDataFilterAsset
infa.cdlg.pages.home.dialog.createNewDataDeidentificationAsset
infa.cdlg.pages.home.dialog.createNewPrecedenceTierAsset
infa.cdlg.pages.home.dialog.createNewDataProtectionAsset