Hiding sensitive column data
#PowerPlatfor, #MDA, #D365
Last updated
#PowerPlatfor, #MDA, #D365
Last updated
Hello guys,
Have you got the requirement on how to hide the sensitive column data when implementing the Power Platform or D365 CE for the client?
Hiding or showing sensitive columns is very useful and necessary. It helps protect information and prevents unauthorized access to sensitive data.
Today, we will talk about some ways you can hide sensitive columns.
Data masking rules provide a robust method to secure sensitive information in Power Platform or D365 CE, such as IDs, credit card numbers, and personal information,... Implementing these rules ensures that this type of data appears in a concealed format, safeguarding it from unauthorized viewing.
My case: The client asked me to hide the Phone Number (format: Vietnam) on entity Contact.
Enable column security for the column you need to mask. In my case, I enable the column Mobilephone on the Contact entity.
Create "Secured masking rule": Create this component in the Solution.
Name: The name of the masking rule.
Description: An optional description of the masking rule.
Regular expression: A regular expression to identify the data to be masked. Define Regex rule in C# is designed to mask Vietnam phone numbers as below.
Run testing firstly:
Create "Attribute Masking Rule": Create this component in the Solution.
Entity: Apply a masking rule to the table. My case is the "Contact" entity
Attribute: The column applied the masking rule of the Entity. My case is the "Mobiphone" column of the Contact entity
Masking Rule: select the specific making rule that has been created in Step 2
That's finished the configuration. Now, we run testing. If you input a valid Vietnam Phone number -> This value will be masked after saving.
😇 You imagine that you just hide this information for some users and the remaining can see it. So...
By utilizing the Field Security Profile alone, without the Masking Rule, managing access becomes more straightforward. You can rapidly adjust user permissions by adding or removing users from the field security profile.
However, the Masking Rule operates on the uppermost layer, overriding the functionality of the Field Security Profile. This feature effectively bypasses the Field Security Profile mechanisms.
So How to do that ???
See you again in the next section. 🫶 Thank you and hoping well. [NTD]yns.Asia ...invite me a cup. ☕ Thank you. ❤️