Security and compliance
Ensure data security and compliance with data masking, monitoring, and change traceability
In this Data Masker Headscratcher, Chris shows us how to mask a Heap table by creating a temporary Unique Key constraint, enabling substitution rules to run.