Goal
Create one policy that protects Date of Birth (DOB) using Datetime data element, with:
- At least one role.
- At least one member source feeding that role.
- Deployed to at least one datastore.
This example provides a walkthrough of the complete workflow to create a policy to protect a Date of Birth (DOB). DOB is a common piece of sensitive personal data, and organizations typically protect it using datetime tokenization. This tokenization preserves the YYYY‑MM‑DD structure while preventing direct exposure of the original value. In this example, a single role is used whose members are obtained from an LDAP-based Member Source. The role is granted permission to protect (tokenize) DOB values.
For this walkthrough, a dedicated DOB data element is created using a date‑specific tokenizer, ensuring that the output maintains a valid date format for downstream systems. The role and data element are combined into a single policy. The policy is then deployed to a datastore so applications working with DOB information can enforce the protection rules at runtime.
Assumptions
To execute any CLI or API command in this example, the following assumptions have been made:
- You are operating on a new AI Team Edition setup.
- Set up the AI Team Edition by installing the Protegrity Provisioned Cluster. For more information about installing the PPC, refer to the section Installing PPC.
- You are connected to the Policy Manager container.
- Connect to the Policy Manager container by deploying the Protegrity Policy Manager. For more information about deploying the Protegrity Policy Manager, refer to the section Installing Policy Workbench.
CLI Examples
To execute any CLI command in this example, the following additional assumption has been made:
- You have access to the PPC CLI.
- For more information about accessing the PPC CLI, refer to the section Accessing the PPC CLI.
- For more information about Policy Management CLI, refer to the section Policy Management Command Line Interface (CLI) Reference.
API Examples
To execute any API command in this example, the following additional assumption has been made:
- You have access to the Protegrity Policy Management REST APIs.
- For more information about accessing the Policy Management REST APIs, refer to the section Using the Policy Management REST APIs.