Home / Guides / Secure logins and data

Before you start, you need to add users, add databases and add roles to your mamori server.

Secure logins

Create a connection policy to determine who can login to mamori server, when they can login and under what circumstances, and the datasources that are available to them.

Open

Secure column data

A database policy adds masking, hashing and encryption transformations on columns without touching underlying data. You can create unique policies to transform different data and grant them to different users and roles.

Open

Secure row data

Create an Access Policy to escalate or de-escalate user privileges to datasources and objects for a set time. The user can then request access to the securable and have this request endorsed or denied by a more senior user.

Open

Secure web application data

Configure data transformations and reveals for Application proxy endpoints.

Open

Row and column-based security features

Request access to data

Request additional privileges for your user.

Open

Endorse or deny policy request

Access policies requested by mamori users can be Endorsed to grant access, or Denied to reject access.

Open

Mask code execution result sets

Create a Result set if a SQL statement fails when it encounters masked data.

Open

Masking Functions

mamori server comes with built-in masking functions for MySQL, Oracle, Postgres, SQL-Server and SAP-Hana. You can add custom masking for any supported database and use them when adding column-based security with Data Policies.

Open

Column Restrictions

If column-based and result set masking fails, you can explicitly mask a specified column for all users as a fallback position.

Open

Create alerts

Learn how to create email, HTTP and push notification alerts for use with Access Policies.

Open