At a Glance
|Versions:||Applicable Delphix Masking versions: 4.x, 5.0.x, 5.1.x, 5.2.x, 5.3.x|
This is a very commonly used algorithm and there are around 20 predefined secure lookup algorithms provided out of the box.
1 Unique Lookup - The loaded lookup values can be duplicated in SL. If a value needs to be represented more frequent - add more records.
3 Due to the randomness in the mapping allocation, there is no way to guarantee that same masked value will not appear even if the number of lookup values exceeds the number of unique values masked. To have 1:1 mapping please use the Mapping Algorithm.
Works with all character encodings. Encoding should give the same result. Data is trimmed.
|Lookup Pool Size:||Recommended size up to 500,000|
|Limitations:||Large pool size (rows in the lookup file) will take a long time to load into the Transformation
Engine. Please see below for more information.
Creation: Lookup values are loaded when the algorithm is created from a text file.
Modify: The Description and the Lookup Value cab be changed.
Secure Lookup is the most common algorithm and there are around 20 predefined secure lookup algorithms provided out of the box.
This document describes how Secure Lookup works and how to create a new one.
The Secure Lookup algorithm is a simple algorithm which uses an XML file. These values are imported in the creation of the lookup algorithm. A Modulus of a hashcode of the encrypted input is used as a lookup value. This method ensures that the lookup value returns the same result each time and that the number of lookup values never runs out. Since the values in the output are reused, this algorithm is not suited for indexes and when the values need to be unique.
It is recommended to limit the number of items in the Secure Lookup to under 500,000.
UI - Creation and Modification
The algorithms are accessed from the tab Settings and under the submenu Algorithm. A custom algorithm can be created and modified (edit):
- To create click "Add Algorithm".
- To modify click the green pen in the "Edit" column.
The following popup is accessed when creating and modifying the algorithm:
- Algorithm Properties
- Algorithm Name
- Lookup Details
- Lookup File Name
Editable parameters are:
- List of lookup values
Note - to change any other parameter the algorithm needs to be deleted and then recreated.
Pool Size and Loadtime Performance
The pool size (number of rows in the lookup file) affects both the creation time and the load time. An estimate is that the increase in load time is 10 to 3 - increase the number of values to load by 3 times and it will take 10 times longer. On an average system, it will take 4 min to load 500,000 values. Loading 1,500,00 will take 40 min.
The graph below shows the load time (duration) in hh:mm:ss for a Secure Lookup with x number of rows.
The ingested values are loaded into RAM when the masking job starts. For large pool sizes, it might be required to increase the Min/Max Memory settings in the Job Configuration. The size required depends on the lengths of the data in the lookup and number of lookup values.
The Secure Lookup is case sensitive. This can be a problem if the same result is expected independent of the case.
To solve this, use this workaround:
- Open and edit the Rule Set
- Add a Custom SQL statement with the following amendment:
Change : ..., maskMeCol, ...
..., UPPER(maskMeCol) as maskMeCol, ...
SELECT ID, UPPER(maskMeCol) as maskMeCol from myTable;
Masked Data Encoded with Non-Standard Code Page
The data to be masked might be encoded and contain characters that are not converted correctly to UTF-8. The masked data is masked as "????". This issue is resolved in version 5.1.
If experiencing this issue please raise a case with Delphix support.
Below is an example of mask result. Note the case sensitivity.
FIRST NAME SL was used in this example:
+-----+--------+----------+ | Ref | Source | Masked | +=====+========+==========+ | 1 | Peter | Flo | +-----+--------+----------+ | 2 | PETER | Yoshiko | << Case insensitivity examples. +-----+--------+----------+ | 3 | peter | Paul | << " +-----+--------+----------+ | 4 | Peter | Flo | << Leading and/or trailing whitespaces are trimmed. +-----+--------+----------+ Result same as Ref 1. ... | 5 | Bar | Yoshiko | << 1:N Mapping - no unique mapping. +-----+--------+----------+