Not logged in - Login


R
e
q
u
e
s
t

a

d
e
m
o
< back

Identity Access Management and Data Masking

{TOC}

In the recent trends, more and more people started asking for the privacy driven by the user access level. More and more ask for the opt in features in the software and devices, so that the company could or not could gather their information and even if the company gathered information - could or could not expose it to the other companies and private parties.

The vendors responded to the challenge. They came up with two ways - dynamic data masking and privacy in-design

New in SQL Server (2016)

TEXT

WhatHere ifare youthe havelinks otheron **thanhow Microsoft solves this problem in SQL Server?

server 2016 and in Azure SQL Server:

TEXThttps://msdn.microsoft.com/en-us/library/mt130841.aspx

https://azure.microsoft.com/en-us/documentation/articles/sql-database-dynamic-data-masking-get-started/

Reporting

TEXTIn reporting, however, the SQL server way with all the XXXs is not necessarily sufficient.

in that case, one can use API components of Hush-Hush.

Privacy in Design - Data Masking In Custom Code

TEXT

Download a Trial