Working With Data Elements
An overview of the data elements used to protect the data.
A policy contains multiple components that work together to enforce protection at the protection endpoints. The role component and policy is tied closely. Any changes made to the organization LDAP, such as a user linked to a role is added or deleted, result in an update to the policy. The automatic deployment of policy is only applicable for automatic roles. When a policy is deployed in ESA, the protectors sends a request to the ESA for retrieving the updated policy. The ESA creates a package containing the updated policy and the protector pulls the package and the related metadata. So, when a change in package is detected due to one of the following reasons, the protector pulls the package:
You can also create a resilient package that is immutable or static by exporting the package using the RPS API. For more information about the RPS API, refer to section APIs for Resilient Protectors in the Protegrity APIs, UDFs, Commands Reference Guide.
An overview of the data elements used to protect the data.
An overview of the Alphabets tab in the Data Elements & Masks screen.
An overview of the Masks tab in the Data Elements & Masks screen.
An overview of Trusted Applications.
A data store identifies one or more protectors.
The Member Sources are the source locations of users and user groups to be involved in the policies.
An overview of roles in Policy Management.