Data Elements
An overview of the data elements used to protect the data.
A Policy contains multiple components that work together to enforce data security at the protection endpoints. The following components can exist in the Policy:
Some of these components have dependencies between each other. Masks and Alphabets are referenced from Data Elements. For example, if you want to create a Gen2 Unicode tokenization Data Element that covers all French characters, then you first need to create an Alphabet. Trusted Applications are attached to Data Stores, as they enable deploying the policy to named applications. Member Sources are referenced within Roles, which in turn pull them into the Policy. Hence, only the parent components such as Data Elements, Roles, and Data Stores are referenced at the Policy level.
The following section provides a walkthrough of a typical process of creating a Policy, from creating Data Elements to Roles. You can follow a different sequence, if preferred, understanding the dependencies between the components.
An overview of the data elements used to protect the data.
Managing custom alphabets.
Managing custom masks.
An overview of Trusted Applications.
A data store identifies one or more protectors.
Overview of the Member Sources.
An overview of roles in Policy Management.
Was this page helpful?