Skip to main content

🛠️ Components of AppSafe

AppSafe consists of the following key components:

🏷️ Component🔑 Description
🗄️ Configuration SetDefines the user databases for anonymization.
🛠️ Utility SetSpecifies the anonymization rules to be implemented.
⚙️ Execution SetCombines Configuration Sets and Utility Sets to execute the anonymization process.
📋 Job SetTracks and manages all anonymization jobs, ensuring independence from subsequent changes in settings.

🗄️ Configuration Set

  • Users define the databases or FTP systems to connect for anonymization.
  • Includes connection details like:
    • Database host.
    • Port.
    • Username and password.
  • Designed for secure and efficient management of client database connections. 🔒

🛠️ Utility Set

  • Users set up Data Anonymization rules, including:
    • Information about tables in a database or files in an FTP system. 📂
    • Columns to be anonymized and the method of anonymization.
    • Conditions to filter a subset of data for targeted anonymization.
  • Offers customizable parameters to specify the type and scope of anonymization. ✨

⚙️ Execution Set

  • Combines the Configuration Set and Utility Set for execution.
  • Features:
    • Runs in multiple steps for complex operations.
    • Allows integration of multiple databases and utility sets for versatile use cases. 🔄

📋 Job Set

  • Tracks all anonymization jobs for an organization. 🕒
  • Uses a snapshot of the Execution Set at job creation, ensuring:
    • Future changes in Execution Set or settings do not affect existing jobs.
    • Reliable and consistent job tracking over time. ✅

AppSafe consists of the following key components:

🏷️ Component🔑 Description
🗄️ Configuration SetDefines the user databases for anonymization.
🛠️ Utility SetSpecifies the anonymization rules to be implemented.
⚙️ Execution SetCombines Configuration Sets and Utility Sets to execute the anonymization process.
📋 Job SetTracks and manages all anonymization jobs, ensuring independence from subsequent changes in settings.

🗄️ Configuration Set

  • Users define the databases or FTP systems to connect for anonymization.
  • Includes connection details like:
    • Database host.
    • Port.
    • Username and password.
  • Designed for secure and efficient management of client database connections. 🔒

🛠️ Utility Set

  • Users set up Data Anonymization rules, including:
    • Information about tables in a database or files in an FTP system. 📂
    • Columns to be anonymized and the method of anonymization.
    • Conditions to filter a subset of data for targeted anonymization.
  • Offers customizable parameters to specify the type and scope of anonymization. ✨

⚙️ Execution Set

  • Combines the Configuration Set and Utility Set for execution.
  • Features:
    • Runs in multiple steps for complex operations.
    • Allows integration of multiple databases and utility sets for versatile use cases. 🔄

📋 Job Set

  • Tracks all anonymization jobs for an organization. 🕒
  • Uses a snapshot of the Execution Set at job creation, ensuring:
    • Future changes in Execution Set or settings do not affect existing jobs.
    • Reliable and consistent job tracking over time. ✅