User Guide: Privacera Encryption Integration with Vertica¶
This user guide explains how to integrate Privacera Encryption with Vertica to enable encryption, decryption, and data masking. It provides step-by-step instructions to help you configure and use these features effectively. - Database: Customer_DB
- Schema: Customer_Schema
- Table: Customer_Data
- User: Sally
- Admin User: dbadmin
(used to create encrypted tables)
Prerequisites¶
- Running Vertica Cluster Single Node or Multi Node.
- Privacera Encryption must be enabled and Integrated in the Vertica cluster.
- Vertica version 12.0.x.
- Sally belongs to group
PEG_GROUP
. PEG_GROUP
is assigned the rolePEG_ROLE
.- Group and Role creation: Vertica Group & Role Documentation
1. Stop Existing Vertica Database¶
To create a new database, stop the currently running one:
2. Create a New Database¶
Use either Command Line or Admin Tool.
Command Line: vsql CLI Usage
Admin Tool: AdminTools Usage
3. Login to vsql¶
Bash | |
---|---|
4. Create Schema and Table¶
5. Insert Sample Data¶
Warning
- This data is fictional and used for demonstration purposes only.
- Any resemblance to real individuals is purely coincidental.
6. Create System and Custom Schemes¶
6.1. Create System Schemes (Encryption, Presentation)¶
- Log in to the Privacera Portal
- Navigate to Encryption & Masking > Encryption & Masking
- Click Generate System Scheme
- Confirm the creation by clicking Yes
- System schemes will be created for:
Encryption
Presentation
- Review the list of default system schemes
6.2. Create Custom Schemes (Encryption, Presentation, Masking)¶
- Navigate to Encryption & Masking > Encryption & Masking
- Click Add Scheme
- Select the scheme type:
Encryption
,Presentation
, orMasking
- Enter the required details and click Save
11. Create Encrypted Table (as dbadmin)¶
11.1. Encrypt the Data¶
Expected Error (Before Policy Applied):
Bash | |
---|---|
In Self-Managed environments, Access Audits can be viewed by navigating to: Access Management > Audits > Access
11.2. Create Scheme Policy for dbadmin¶
- Navigate to Access Management > Scheme Policies
- Click Add Scheme Policy
- Enter Protect Access for dbadmin as the Policy Name.
- Under Schemes, select the following:
- SYSTEM_SSN
- SYSTEM_EMAIL
- SYSTEM_CREDITCARD
- SYSTEM_ADDRESS
- In the Users section, select dbadmin.
- Set Permissions to Protect.
- Click Save to create the policy.
11.3. Run the Encryption Query Again¶
11.4 Verify:¶
SQL | |
---|---|
12. Decrypt the Data (as Sally)¶
12.1 Grant SELECT to Sally¶
SQL | |
---|---|
12.2 Create UnProtect Scheme Policy for Sally:¶
- Navigate to Access Management > Scheme Policies
- Click on Add Scheme Policy
- Policy Name: Unprotect Access
- Schemes: SYSTEM_SSN, SYSTEM_EMAIL, SYSTEM_CREDITCARD, SYSTEM_ADDRESS
- Select PEG_ROLE in the Role section
- Permissions:
- Unprotect
- Click Save
12.3 Run the following query to decrypt the data:¶
SQL | |
---|---|
13 Obfuscate the Data¶
13.1 Policy: Presentation Access¶
- Policy Name:
Presentation Access
- Encryption Schemes:
System_SSN
,SYSTEM_EMAIL
,SYSTEM_CREDITCARD
,SYSTEM_ADDRESS
- Presentation Schemes:
SYSTEM_PRESENTATION_SSN
,SYSTEM_PRESENTATION_EMAIL
,SYSTEM_PRESENTATION_CREDITCARD
,SYSTEM_PRESENTATION_ADDRESS
- Allow:
- Role:
PEG_ROLE
- Permission:
Unprotect
13.2 SQL to Obfuscate Data¶
14. Mask the Data¶
14.1 Policy: Mask Access¶
- Policy Name:
Mask Access
- Masking Schemes:
MASK_SSN
,MASK_EMAIL
,MASK_ADDRESS
- Allow:
- Role:
PEG_ROLE
- Permission:
MASK
14.2 SQL to Mask Data¶
SQL | |
---|---|