Home / Guides / Secure logins and data

Before you start, you need to add users, add databases and add roles to your mamori server.


Learn how mamori server policies can secure your data from misuse.

Secure logins

Create a connection policy to determine who can login to mamori server, when they can login and under what circumstances, and the datasources that are available to them.


Secure column data

A database policy adds masking, hashing and encryption transformations on columns without touching underlying data. You can create unique policies to transform different data and grant them to different users and roles.


Secure row data

Create an Access Policy to escalate or de-escalate user privileges to datasources and objects for a set time. The user can then request access to the securable and have this request endorsed or denied by a more senior user.


Secure web application data

Configure data transformations and reveals for Application proxy endpoints.


Row and column-based security features

Request access to data

Request additional privileges for your user.


Endorse or deny policy request

Access policies requested by mamori users can be Endorsed to grant access, or Denied to reject access.


Mask code execution result sets

Create a Result set if a SQL statement fails when it encounters masked data.


Masking Functions

mamori server comes with built-in masking functions for MySQL, Oracle, Postgres, SQL-Server and SAP-Hana. You can add custom masking for any supported database and use them when adding column-based security with Data Policies.


Column Restrictions

If column-based and result set masking fails, you can explicitly mask a specified column for all users as a fallback position.


Create alerts

Learn how to create email, HTTP and push notification alerts for use with Access Policies.