{"id":12628,"date":"2019-03-12T14:02:29","date_gmt":"2019-03-12T18:02:29","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=12628"},"modified":"2019-12-16T08:16:34","modified_gmt":"2019-12-16T13:16:34","slug":"db-data-class-masking","status":"publish","type":"post","link":"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/","title":{"rendered":"Data Class Database Masking"},"content":{"rendered":"<p class=\"c5\"><span class=\"c1\">The\u00a0<\/span><em><span class=\"c1\">Data Class Database Masking<\/span><span class=\"c1\">\u00a0Job<\/span><\/em><span class=\"c1\">\u00a0wizard in\u00a0<\/span><span class=\"c4 c1\"><a class=\"c8\" href=\"https:\/\/www.iri.com\/products\/workbench\/discover-data\">IRI Workbench<\/a><\/span><span class=\"c1\">\u00a0can be used with an\u00a0<a href=\"https:\/\/www.iri.com\/products\/fieldshield\">IRI FieldShield<\/a> or <a href=\"https:\/\/www.iri.com\/products\/voracity\">Voracity<\/a>\u00a0license to <a href=\"https:\/\/www.iri.com\/solutions\/data-masking\">mask PII<\/a> in multiple, disparate database sources that have been previously classified. Classifying data during or before data discovery and masking is one way you can <a href=\"https:\/\/www.iri.com\/products\/workbench\/fieldshield-gui\/apply-rules\">apply masking functions consistently<\/a> and thus preserve referential integrity. Read about data classification in IRI Workbench <a href=\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-classification-in-iri-workbench\/\">here<\/a>.<\/span><\/p>\n<p class=\"c5\"><span class=\"c1\">While it was possible to use the data classes in many of the existing wizards, if the data class library included a lot of classified\u00a0<\/span><span class=\"c1\">columns, selection of th<\/span><span class=\"c2 c1\">e containing tables was cumbersome.\u00a0<\/span><span class=\"c2 c1\">Additionally, only one database at a time could be protected. This wizard allows selection and masking of multiple database sources along with multiple schemas and tables.<\/span><\/p>\n<p class=\"c5\"><span class=\"c2 c1\">While this example will not show all the prerequisite steps, here is an overview:<\/span><\/p>\n<ol class=\"c7 lst-kix_bi5ns0j7xtbt-0 start\" start=\"1\">\n<li class=\"c5 c6\"><span class=\"c2 c1\">Set up data classes in preferences.<\/span><\/li>\n<li class=\"c5 c6\"><span class=\"c2 c1\">Create field rules.<\/span><\/li>\n<li class=\"c5 c6\"><span class=\"c1\">Create a data class library (in this example, using the\u00a0<\/span><span class=\"c1 c4\"><a class=\"c8\" href=\"https:\/\/www.iri.com\/blog\/data-transformation2\/schema-data-class-search\">Schema Data Class Search<\/a><\/span><span class=\"c2 c1\">\u00a0wizard). Make sure that data classes are mapped to columns.<\/span><\/li>\n<li class=\"c5 c6\"><span class=\"c2 c1\">Assign default rules to data classes in the data class library.<\/span><\/li>\n<\/ol>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12634 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source1.png\" alt=\"Data Class\" width=\"979\" height=\"308\" \/><\/a><\/p>\n<p class=\"c5\"><span class=\"c2 c1\">In this library, there are five sources that pull from three databases and three schemas. There are two data classes that are used in five data class mappings. There are different rules assigned to the data classes. There is one source that does not have a mapping (SCOTT.PERSONS).<\/span><\/p>\n<p class=\"c5\"><span class=\"c2 c1\">Begin using the wizard by right-clicking the data class library in the Project Explorer and selecting <em>Mask Included Database Sources<\/em>.<\/span><\/p>\n<p class=\"c5\"><span class=\"c1\">On the Setup page (shown below), enter the job details. There is an optional Summary page; however, it is not recommended to display it if there are a large number of sources, as it may take a while to load. <\/span><span class=\"c1\">In this example, check the box for the Summary page to be shown. <\/span><\/p>\n<p class=\"c5\"><span class=\"c1\">Select an output type:\u00a0<\/span><span class=\"c3 c1\"><strong>Same<\/strong>\u00a0<\/span><span class=\"c1\">will use an Update function to modify only classified columns and load into the same table using ODBC. This option cannot be used if the primary key (or the first column if no PK) is being transformed.\u00a0<\/span><span class=\"c1 c3\"><strong>Different<\/strong>\u00a0<\/span><span class=\"c1\">will display a loader page to make selections about the targets.\u00a0<\/span><span class=\"c3 c1\"><strong>Flat files<\/strong>\u00a0<\/span><span class=\"c1\">will produce a delimited file for each of the modified tables. In this example,\u00a0<\/span><span class=\"c3 c1\"><strong>Different<\/strong><\/span><span class=\"c1\"><strong>\u00a0<\/strong>is selected. Click\u00a0<\/span><span class=\"c3 c1\"><strong>Next<\/strong><\/span><span class=\"c2 c1\">.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/03\/DCM_setup.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12677 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/03\/DCM_setup.png\" alt=\"\" width=\"813\" height=\"494\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/DCM_setup.png 813w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/DCM_setup-300x182.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/DCM_setup-768x467.png 768w\" sizes=\"(max-width: 813px) 100vw, 813px\" \/><\/a><\/p>\n<p><span class=\"c1\">The Data Class Filter page allows the inclusion of selected data classes only. An error will be shown if any of the selected data classes do not have a default rule assigned. Click <strong>Next<\/strong><\/span><span class=\"c2 c1\">.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12635 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source2.png\" alt=\"Data Class Filter\" width=\"813\" height=\"494\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source2.png 813w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source2-300x182.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source2-768x467.png 768w\" sizes=\"(max-width: 813px) 100vw, 813px\" \/><\/a><\/p>\n<p class=\"c5\"><span class=\"c1\">The Source page is populated with the data sources that are referenced in a data class map. For example, SCOTT.PERSONS did not contain any classified columns and is therefore not included. Select the data sources to be protected by this job. Click\u00a0<\/span><span class=\"c10 c3 c1\"><strong>Next<\/strong>.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12636 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source3.png\" alt=\"Data Source\" width=\"813\" height=\"494\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source3.png 813w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source3-300x182.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source3-768x467.png 768w\" sizes=\"(max-width: 813px) 100vw, 813px\" \/><\/a><\/p>\n<p class=\"c5\"><span class=\"c1\">The Loader page is where the target details are entered. The table contains a list of unique Data Source Name (DSN) and Schema pairings. For each pairing, a DSN, Schema and Loader must be assigned. Make a selection and either double-click or click\u00a0<\/span><strong><span class=\"c3 c1\">Edit<\/span><\/strong><span class=\"c2 c1\">.<\/span><\/p>\n<p class=\"c5\"><span class=\"c1\">On the displayed screen, enter the details for the target. The Loader options are filtered based on the database type. ODBC is also available for each database to use instead of a bulk loader or if one is not available. Click\u00a0<\/span><strong><span class=\"c3 c1\">OK<\/span><\/strong><span class=\"c2 c1\">.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12638 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source5.png\" alt=\"Schema Loader Map\" width=\"525\" height=\"450\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source5.png 525w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source5-300x257.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source5-350x300.png 350w\" sizes=\"(max-width: 525px) 100vw, 525px\" \/><\/a><\/p>\n<p class=\"c5\"><span class=\"c2 c1\">Repeat this for each of the table items. If Oracle SQL Loader is used, there is an option to disable Direct Load. There are also options to truncate and temporarily disable the foreign keys.<\/span><\/p>\n<p class=\"c5\"><span class=\"c1\">Note that the tables must already exist in the target location with the same table name and structure as the source. Otherwise, the tables will need to be created before the job is executed. Click\u00a0<\/span><strong><span class=\"c3 c1\">Next<\/span><\/strong><span class=\"c2 c1\">.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12639 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source6.png\" alt=\"Data Loading Stage\" width=\"813\" height=\"494\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source6.png 813w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source6-300x182.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source6-768x467.png 768w\" sizes=\"(max-width: 813px) 100vw, 813px\" \/><\/a><\/p>\n<p><span class=\"c1\">The Summary page displays the data class rules and which columns will be using that rule. Click\u00a0<\/span><strong><span class=\"c3 c1\">Finish<\/span><\/strong><span class=\"c2 c1\">.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12640 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source7.png\" alt=\"Summary\" width=\"813\" height=\"494\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source7.png 813w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source7-300x182.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source7-768x467.png 768w\" sizes=\"(max-width: 813px) 100vw, 813px\" \/><\/a><\/p>\n<p>After the wizard closes, a Flow Diagram of the job is opened. It displays the components produced for the designed output. It includes scripts, SQL files, and loader files. The files are contained in the project folder and also include an executable script to run the job.<\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source8.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-12641 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source8.png\" alt=\"Flow Diagram\" width=\"835\" height=\"419\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source8.png 971w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source8-300x150.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source8-768x385.png 768w\" sizes=\"(max-width: 835px) 100vw, 835px\" \/><\/a><\/p>\n<p class=\"c5\"><span class=\"c2 c1\">Below is one of the scripts that is produced by the wizard. This particular table had two classified columns both of which were transformed but using different rules. The outline displays a different icon for the two fields that are now protected.<\/span><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source9.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-12642 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source9-1024x437.png\" alt=\"Produced script\" width=\"834\" height=\"356\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source9-1024x437.png 1024w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source9-300x128.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source9-768x328.png 768w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/protect-db-source9.png 1425w\" sizes=\"(max-width: 834px) 100vw, 834px\" \/><\/a><\/p>\n<p>This wizard saves time by providing target choices en masse for disparate database sources and targets.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The\u00a0Data Class Database Masking\u00a0Job\u00a0wizard in\u00a0IRI Workbench\u00a0can be used with an\u00a0IRI FieldShield or Voracity\u00a0license to mask PII in multiple, disparate database sources that have been previously classified. Classifying data during or before data discovery and masking is one way you can apply masking functions consistently and thus preserve referential integrity. Read about data classification in IRI<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/\" title=\"Data Class Database Masking\">Read More<\/a><\/div>\n","protected":false},"author":43,"featured_media":12684,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[1391,1393,1081,14,1305,1372,519,1398,1392,1093,850,296,240],"class_list":["post-12628","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","tag-data-class-masking","tag-data-class-schema","tag-data-classification","tag-data-masking","tag-data-masking-tools","tag-data-schema","tag-database","tag-database-masking","tag-database-schema","tag-flow","tag-iri-workbench","tag-masking","tag-referential-integrity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Class Database Masking - IRI<\/title>\n<meta name=\"description\" content=\"Using the\u00a0Data Class Database Masking\u00a0Job\u00a0wizard in\u00a0IRI Workbench\u00a0allows users to protect large numbers of database sources that have been previously\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Class Database Masking - IRI\" \/>\n<meta property=\"og:description\" content=\"Using the\u00a0Data Class Database Masking\u00a0Job\u00a0wizard in\u00a0IRI Workbench\u00a0allows users to protect large numbers of database sources that have been previously\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-12T18:02:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-16T13:16:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/DCM_feature.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Claudia Irvine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Claudia Irvine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/\"},\"author\":{\"name\":\"Claudia Irvine\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/72af50bbb317610e193e96392081f9b0\"},\"headline\":\"Data Class Database Masking\",\"datePublished\":\"2019-03-12T18:02:29+00:00\",\"dateModified\":\"2019-12-16T13:16:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/\"},\"wordCount\":740,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/DCM_feature.png\",\"keywords\":[\"data class masking\",\"data class schema\",\"data classification\",\"data masking\",\"data masking tools\",\"data schema\",\"database\",\"database masking\",\"database schema\",\"flow\",\"IRI Workbench\",\"masking\",\"referential integrity\"],\"articleSection\":[\"Data Masking\/Protection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/\",\"name\":\"Data Class Database Masking - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/DCM_feature.png\",\"datePublished\":\"2019-03-12T18:02:29+00:00\",\"dateModified\":\"2019-12-16T13:16:34+00:00\",\"description\":\"Using the\u00a0Data Class Database Masking\u00a0Job\u00a0wizard in\u00a0IRI Workbench\u00a0allows users to protect large numbers of database sources that have been previously\",\"breadcrumb\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/#primaryimage\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/DCM_feature.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/DCM_feature.png\",\"width\":600,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/beta.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Class Database Masking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beta.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/72af50bbb317610e193e96392081f9b0\",\"name\":\"Claudia Irvine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fb33dee44756bd13ac23f1342c2bb7b2?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fb33dee44756bd13ac23f1342c2bb7b2?s=96&d=blank&r=g\",\"caption\":\"Claudia Irvine\"},\"url\":\"https:\/\/beta.iri.com\/blog\/author\/claudiai\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Class Database Masking - IRI","description":"Using the\u00a0Data Class Database Masking\u00a0Job\u00a0wizard in\u00a0IRI Workbench\u00a0allows users to protect large numbers of database sources that have been previously","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/","og_locale":"en_US","og_type":"article","og_title":"Data Class Database Masking - IRI","og_description":"Using the\u00a0Data Class Database Masking\u00a0Job\u00a0wizard in\u00a0IRI Workbench\u00a0allows users to protect large numbers of database sources that have been previously","og_url":"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/","og_site_name":"IRI","article_published_time":"2019-03-12T18:02:29+00:00","article_modified_time":"2019-12-16T13:16:34+00:00","og_image":[{"width":600,"height":200,"url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/DCM_feature.png","type":"image\/png"}],"author":"Claudia Irvine","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Claudia Irvine","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/#article","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/"},"author":{"name":"Claudia Irvine","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/72af50bbb317610e193e96392081f9b0"},"headline":"Data Class Database Masking","datePublished":"2019-03-12T18:02:29+00:00","dateModified":"2019-12-16T13:16:34+00:00","mainEntityOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/"},"wordCount":740,"commentCount":1,"publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/DCM_feature.png","keywords":["data class masking","data class schema","data classification","data masking","data masking tools","data schema","database","database masking","database schema","flow","IRI Workbench","masking","referential integrity"],"articleSection":["Data Masking\/Protection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/","url":"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/","name":"Data Class Database Masking - IRI","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/#primaryimage"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/DCM_feature.png","datePublished":"2019-03-12T18:02:29+00:00","dateModified":"2019-12-16T13:16:34+00:00","description":"Using the\u00a0Data Class Database Masking\u00a0Job\u00a0wizard in\u00a0IRI Workbench\u00a0allows users to protect large numbers of database sources that have been previously","breadcrumb":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/#primaryimage","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/DCM_feature.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/DCM_feature.png","width":600,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/db-data-class-masking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beta.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Class Database Masking"}]},{"@type":"WebSite","@id":"https:\/\/beta.iri.com\/blog\/#website","url":"https:\/\/beta.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beta.iri.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beta.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/beta.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/72af50bbb317610e193e96392081f9b0","name":"Claudia Irvine","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fb33dee44756bd13ac23f1342c2bb7b2?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fb33dee44756bd13ac23f1342c2bb7b2?s=96&d=blank&r=g","caption":"Claudia Irvine"},"url":"https:\/\/beta.iri.com\/blog\/author\/claudiai\/"}]}},"jetpack_featured_media_url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/03\/DCM_feature.png","_links":{"self":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/12628"}],"collection":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=12628"}],"version-history":[{"count":21,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/12628\/revisions"}],"predecessor-version":[{"id":13404,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/12628\/revisions\/13404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media\/12684"}],"wp:attachment":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=12628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=12628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=12628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}