<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Additional Information on</title><link>https://docs.protegrity.com/protectors/10.1/docs/bdp/bdp_appendix/</link><description>Recent content in Additional Information on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/protectors/10.1/docs/bdp/bdp_appendix/index.xml" rel="self" type="application/rss+xml"/><item><title>Migrating Tokenized Unicode Data</title><link>https://docs.protegrity.com/protectors/10.1/docs/bdp/bdp_appendix/bdp_migrate_tokenized_unicode_data_across_teradata/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/bdp/bdp_appendix/bdp_migrate_tokenized_unicode_data_across_teradata/</guid><description>&lt;p>The procedure to migrate tokenized Unicode data from and to a Teradata database are listed below.&lt;/p>
&lt;blockquote>
&lt;p>This section is only applicable for Legacy Unicode and Base64 Unicode data element. &lt;br> This section considers the Teradata database for reference. &lt;br> In addition to the Teradata database, the Big Data Protector works with other databases, such as Netezza and Greenplum.&lt;/p>&lt;/blockquote>
&lt;h2 id="migrating-tokenized-unicode-data-from-a-teradata-database">Migrating Tokenized Unicode Data from a Teradata Database&lt;/h2>
&lt;p>This section describes the task to unprotect the tokenized Unicode data in Hive, Impala, or Spark, which was tokenized in the Teradata database using the Protegrity Database Protector and then migrated to Hive, Impala, MapReduce, or Spark.&lt;/p></description></item><item><title>Return Codes for the Big Data Protector</title><link>https://docs.protegrity.com/protectors/10.1/docs/bdp/bdp_appendix/bdp_return_codes/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/bdp/bdp_appendix/bdp_return_codes/</guid><description>&lt;p>If you are using the Big Data Protector and any failures occur, then the protector throws an exception. The exception consists of an error code and error message. All the possible error codes and error messages are described below.&lt;/p>
&lt;p>The following table lists all errors returned from the Core layer that are logged.&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Code&lt;/th>
 &lt;th>Error&lt;/th>
 &lt;th>Error Message&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>0&lt;/td>
 &lt;td>NONE&lt;/td>
 &lt;td> &lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>1&lt;/td>
 &lt;td>USER_NOT_FOUND&lt;/td>
 &lt;td>The username could not be found in the policy.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>2&lt;/td>
 &lt;td>DATA_ELEMENT_NOT_FOUND&lt;/td>
 &lt;td>The data element could not be found in the policy.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>3&lt;/td>
 &lt;td>PERMISSION_DENIED&lt;/td>
 &lt;td>The user does not have the appropriate permissions to perform the requested operation.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>4&lt;/td>
 &lt;td>TWEAK_NULL&lt;/td>
 &lt;td>Tweak is null.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>5&lt;/td>
 &lt;td>INTEGRITY_CHECK_FAILED&lt;/td>
 &lt;td>Integrity check failed.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>6&lt;/td>
 &lt;td>PROTECT_SUCCESS&lt;/td>
 &lt;td>Data protect operation was successful.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>7&lt;/td>
 &lt;td>PROTECT_FAILED&lt;/td>
 &lt;td>Data protect operation failed.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>8&lt;/td>
 &lt;td>UNPROTECT_SUCCESS&lt;/td>
 &lt;td>Data unprotect operation was successful.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>9&lt;/td>
 &lt;td>UNPROTECT_FAILED&lt;/td>
 &lt;td>Data unprotect operation failed.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>10&lt;/td>
 &lt;td>OK_ACCESS&lt;/td>
 &lt;td>The user has appropriate permissions to perform the requested operation but no data has been protected/unprotected.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>11&lt;/td>
 &lt;td>INACTIVE_KEYID_USED&lt;/td>
 &lt;td>Data unprotect operation was successful with use of an inactive keyid.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>12&lt;/td>
 &lt;td>INVALID_PARAM&lt;/td>
 &lt;td>Input is null or not within allowed limits.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>13&lt;/td>
 &lt;td>INTERNAL_ERROR&lt;/td>
 &lt;td>Internal error occurring in a function call after the Core Provider has been opened.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>14&lt;/td>
 &lt;td>LOAD_KEY_FAILED&lt;/td>
 &lt;td>Failed to load data encryption key.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>15&lt;/td>
 &lt;td>TWEAK_INPUT_TOO_LONG&lt;/td>
 &lt;td>Tweak input is too long.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>17&lt;/td>
 &lt;td>INIT_FAILED&lt;/td>
 &lt;td>Failed to initialize the CORE - This is a fatal error&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>19&lt;/td>
 &lt;td>UNSUPPORTED_TWEAK&lt;/td>
 &lt;td>Unsupported tweak action for the specified FPE data element.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>20&lt;/td>
 &lt;td>OUT_OF_MEMORY&lt;/td>
 &lt;td>Failed to allocate memory.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>21&lt;/td>
 &lt;td>BUFFER_TOO_SMALL&lt;/td>
 &lt;td>Input or output buffer is too small.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>22&lt;/td>
 &lt;td>INPUT_TOO_SHORT&lt;/td>
 &lt;td>Data is too short to be protected/unprotected.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>23&lt;/td>
 &lt;td>INPUT_TOO_LONG&lt;/td>
 &lt;td>Data is too long to be protected/unprotected.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>25&lt;/td>
 &lt;td>USERNAME_TOO_LONG&lt;/td>
 &lt;td>Username too long.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>26&lt;/td>
 &lt;td>UNSUPPORTED&lt;/td>
 &lt;td>Unsupported algorithm or unsupported action for the specific data element.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>27&lt;/td>
 &lt;td>APPLICATION_AUTHORIZED&lt;/td>
 &lt;td>Application has been authorized.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>28&lt;/td>
 &lt;td>APPLICATION_NOT_AUTHORIZED&lt;/td>
 &lt;td>Application has not been authorized.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>31&lt;/td>
 &lt;td>EMPTY_POLICY&lt;/td>
 &lt;td>Policy not available.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>40&lt;/td>
 &lt;td>LICENSE_EXPIRED&lt;/td>
 &lt;td>No valid license or current date is beyond the license expiration date.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>41&lt;/td>
 &lt;td>METHOD_RESTRICTED&lt;/td>
 &lt;td>The use of the protection method is restricted by license.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>42&lt;/td>
 &lt;td>LICENSE_INVALID&lt;/td>
 &lt;td>Invalid license or time is before licensestart.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>44&lt;/td>
 &lt;td>INVALID_FORMAT&lt;/td>
 &lt;td>The content of the input data is not valid.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>49&lt;/td>
 &lt;td>LOG_UNSUPPORTED_ENCODING&lt;/td>
 &lt;td>Unsupported input encoding for the specific data element.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>50&lt;/td>
 &lt;td>REPROTECT_SUCCESS&lt;/td>
 &lt;td>Data reprotect operation was successful.&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>51&lt;/td>
 &lt;td>LOG_LOG_UNREACHABLE&lt;/td>
 &lt;td>Failed to send logs, connection refused.&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;p>The following table lists all the error messages returned from the Core layer that are NOT logged.&lt;/p></description></item></channel></rss>