Skip to main content

Steps to Perform Dynamic Masking in PK Protect

Following steps are to be executed to support dynamic masking in PK Protect.

  1. Install a new dynamic masking license under Admin > License Management screen to enable Dynamic Masking components in PK Protect.

  2. Go to Admin > Settings screen and configure the credentials for the setting displayed in the screenshot below to connect to the proxy server. Under this setting, enter the hostname/IP address, username, and password for the proxy server.

  3. Configure the entities of Dynamic Masking i.e., User, Device, Policy etc. Refer to the screens explained under Dynamic Masking Configuration section.

  4. Create a new policy for dynamic masking under Policy > DBMS Dynamic Masking. Dynamic Masking policies need policy groups and masking options, which are configured under Policy Groups and Masking Methods screens. To know more on how to create a Dynamic Masking Policy, refer Dynamic Masking Policy.

*Note: To automate the process for Dynamic Masking, the user need not to add any policies keys and masking polices while defining policy groups in the Policy Groups screen.

  1. Establish a new connection for Detection and Masking IDP in RDBMS. For more details on how to create a connection for detection and masking, refer to RDBMS Detection Connection and RDBMS Masking Connection, respectively.

*Note: Dynamic Masking is supported for the following databases: Oracle, SQL Server, DB2 and MySQL.

  1. Execute a detection and dynamic masking task in RDBMS. Detection task is optional but highly recommended. If the user has executed the detection task and fetched the details of all the sensitive columns, then the user can create and push the dynamic masking task with the appropriate policy group to the dynamic masking engine. This will automatically create various masking policies for all the detected sensitive columns in Dynamic Masking Config > Masking Policies.


    Also, the masking policies will be auto selected in the Policy group.


    For more details on how to create a detection and dynamic masking task, refer RDBMS Detection Task and Dynamic Masking Task respectively.

  2. On executing the above-mentioned steps, dynamic masking task in PK Protect gets completed. User can verify masking by connecting to the proxy server via any database client.
    For example, refer to below screenshot:


    On executing the queries using the proxy connection, data is masked as per the rules defined in Dynamic Masking Configuration section.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.