Transformations > Access Policy transformation > Access Policy transformation example
  

Access Policy transformation example

You are a data integration developer at a bank. You need to make customer data available to a colleague in the marketing department for customer analysis. As part of their role and the needs of their project, your colleague in the marketing department has limited access rights to customer data.
Use an Access Policy transformation to ensure that your organization complies with data privacy regulations while allowing your colleague to gain valuable insights. At run time, the transformation applies data access policies that your organization created on the Data Access Management page in Data Governance and Catalog according to the data requirements of your organization. These data access policies hide or obscure the information for which your colleague does not have access rights based on metadata and the properties that you set on the Access Policy tab.
The following image shows a table called BANK_CUSTOMERS, which includes contact details, birth dates, and other personally identifiable information:
A preview of the Source showing raw data
To configure the mapping, complete the following tasks:
    1Create a mapping.
    2Add a Source transformation that reads the BANK_CUSTOMERS source table.
    3Add an Access Policy transformation to the mapping canvas, and connect it to the data flow.
    4On the Access Policy tab, perform the following steps:
    1. aIn the Consumer field, select your marketing department colleague. Active users in your organization with the Data Marketplace User role appear in this list.
    2. bIn the Usage field, select "customer analysis" as the usage context.
    3. cIn the Data Asset field, select the BANK_CUSTOMERS table as the source data asset.
    4. dTo use consistent tokenization, enter a consistency seed from another Access Policy transformation. Otherwise, generate a new consistency seed.
    5. eClick Synchronize Access Policy.
    5Add other transformations to the mapping as required.
    6Add a Target transformation to the mapping and connect it to the upstream transformation.
    7Click Run.
    The mapping task applies the policies to the data, protecting it.
The following image shows the protected data:
A preview of the Access Policy transformation showing protected data
The Access Policy transformation protects the data in the following ways:
The customer ID, customer type, country, gender, marital status, and profession remain unaltered.