About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Governing virtual data with data protection rules in Data Virtualization
Last updated: Mar 17, 2025
You can govern your virtual data by defining data protection rules.
Before you begin
These instructions assume that you completed the
following prerequisites:
- Created data protection rules in IBM Knowledge Catalog. For more information, see Managing data protection rules.
- Configured the cache settings for data protection rules. For more information, see Configuring PEP cache settings for data protection rules in Data Virtualization.
- Published and annotated the objects that you want to be subject to data protection rules to a governed catalog. For more information, see Publishing virtual data to the catalog in Data Virtualization.
About this task
When you publish virtualized data assets to a catalog, they become subject to the defined data protection rules.
When IBM Knowledge Catalog is installed on the same Cloud Pak for Data instance as Data Virtualization, the enforcement of IBM Knowledge Catalog data protection rules is always enabled.
You can use following types of data protection rules in Data Virtualization:
Note: Db2 evaluates and
enforces authorizations (Allow or Deny) separately from RCAC (column masks and row filters), while
IBM Knowledge Catalog
evaluates all applicable data protection rules (including both authorizations and RCAC) to yield a
single decision. For example, if an IBM Knowledge Catalog column masking
or row filtering rule applies in addition to a Deny authorization rule, then IBM Knowledge Catalog denies
authorization under the "Most secure action wins" rule action precedence. This means that the Data Virtualization authorization request will be denied, and RCAC won't yield or apply any column
masks or row filters.
- Data masking
- Data masking is used to hide sensitive data but still allow users to use the asset.
- Row-level filtering
-
You can create data protection rules to include or exclude rows in your virtualized data to limit the rows that users can see. For example, you can define a rule so that employees can see customer data that is associated only with their department.
For more information, see Row-level filtering in Data Virtualization.
Watch the following video for an overview of access control in governance and data protection in Data Virtualization.
This video provides a visual method to learn the concepts and tasks in this documentation.
- IBM Knowledge Catalog DPRs and Data Virtualization GRANTs
Data Virtualization determines whether you have access to an object through Db2 authorization checks (or GRANTs) and IBM Knowledge Catalog data protection rules (DPRs). IBM Knowledge Catalog DPRs restrict access to governed objects that are published to a governed catalog.
The following diagram illustrates this process: If the enforcement of IBM Knowledge Catalog DPRs is enabled in Data Virtualization, they are evaluated against the IBM Knowledge Catalog catalog assets to determine your authorization to access the objects. If you are granted authority to the objects, then Data Virtualization conducts Db2 authorization checks to confirm your access. You can only access the objects if you are authorized in both cases.
- Data Virtualization data source definitions (DSD)
- A data source definition (DSD) is a unique stable identifier for the connections across all the catalogs and projects that connect to your particular Data Virtualization instance.
Procedure
To govern your virtual data with data protection rules:
Was the topic helpful?
0/1000