GNU Privacy Guard (GPG)
GPG software is used to encrypt and decrypt data using a public and private key.
For any Transform action, if you click the ( ) icon to add a new rule, a message TRANSFORM rule cannot have a child rule under it appears.
The fields for the Transform action are as seen in the following figure.
The following table describes the methods applicable to the Transform action.
Field | Description |
---|---|
Protegrity Data Protection | Protect data using Protegrity Data Protection methods such as tokenization or encryption. |
Regular Expression Replace | List the patterns to replace for regular expression transformation. |
User Defined Transformation | Provide User Defined Functions (UDFs) for transformation. |
GNU Privacy Guard (GPG) | Enable GPG encryption and decryption for data transformation. |
SAML Codec | Enable Security Assertion Markup Language (SAML) support. |
The Transform action type must always be created as a leaf node (a rule without any child nodes).
If an External IV value is configured in the Transform rule, with the case-preserving and position-preserving property enabled in Alpha-Numeric (0-9, a-z, A-Z) token type, then the External IV property cannot be used to transform sensitive data.
GPG software is used to encrypt and decrypt data using a public and private key.
Fields related to the transform rule.
Regular expressions related to the transform rule.
Manage user authentication and authorization uniformly for multiple applications on the same network.
After the DSG instance.