Transform

The transformation of data depends on the method type applied on the data

For any Transform action, if you click the ( ) icon to add a new rule, a message TRANSFORM rule cannot have a child rule under it appears.

The fields for the Transform action are as seen in the following figure.

Transform Action

The following table describes the methods applicable to the Transform action.

FieldDescription
Protegrity Data ProtectionProtect data using Protegrity Data Protection methods such as tokenization or encryption.
Regular Expression ReplaceList the patterns to replace for regular expression transformation.
User Defined TransformationProvide User Defined Functions (UDFs) for transformation.
GNU Privacy Guard (GPG)Enable GPG encryption and decryption for data transformation.
SAML CodecEnable Security Assertion Markup Language (SAML) support.

The Transform action type must always be created as a leaf node (a rule without any child nodes).

If an External IV value is configured in the Transform rule, with the case-preserving and position-preserving property enabled in Alpha-Numeric (0-9, a-z, A-Z) token type, then the External IV property cannot be used to transform sensitive data.


GNU Privacy Guard (GPG)

GPG software is used to encrypt and decrypt data using a public and private key.

Protegrity Data Protection method

Fields related to the transform rule.

Regular expression replace

Regular expressions related to the transform rule.

Security Assertion Markup Language (SAML) codec

Manage user authentication and authorization uniformly for multiple applications on the same network.

User defined transformation

After the DSG instance.

Last modified January 30, 2025