e
q
u
e
s
t
a
d
e
m
o < back
Identity Access Management and Data Masking
{TOC}
Identity Access Management and Data Masking
In the recent trends, more and more people started asking for the privacy driven by the user access level. More and more ask for the opt in features in the software and devices, so that the company could or not could gather their information and even if the company gathered information - could or could not expose it to the other companies and private parties.
The vendors responded to the challenge. They came up with two ways - dynamic data masking and privacy in-design
New in SQL Server (2016)
Here are the links on how Microsoft solves this problem in SQL server 2016 and in Azure SQL Server:
https://msdn.microsoft.com/en-us/library/mt130841.aspx
https://azure.microsoft.com/en-us/documentation/articles/sql-database-dynamic-data-masking-get-started/
Reporting
In reporting, however, the SQL server way with all the XXXs is not necessarily sufficient.
in that case, one can use API components of Hush-Hush.
Privacy in Design - Data Masking In Custom Code
TEXT