Learn how to store database credentials and allow the discovery and classification of
sensitive data.
About this task
The following procedure describes how to create datasources by storing database credentials
using the compliance monitoring tool. Storing credentials and creating datasources allows Guardium
to access your databases for the discovery and classification of sensitive data.
Procedure
- Use one of the following methods to identify where database credentials are required.
- In the Scanning for sensitive data section of a compliance monitoring
tile, look for a
icon and click the associated Datasource credentials link. The
compliance monitoring databases view will open to a filtered list of databases that require
credentials.
- Click the View databases link to open the compliance monitoring
databases view and look for databases that do not have a
icon in the Datasource column.
- From the compliance monitoring databases view, select databases that require credentials and
click .
Tips: If you select multiple databases and click , the provided credentials are saved for all selected databases. When providing
credentials for multiple databases, make sure that the selected databases all use the same
credentials. Otherwise, databases that use different credentials will fail the connection test.
Storing credentials enables the discovery and classification of
sensitive data for some compliance types. If automated configuration is not supported, the
datasources created when you store credentials can be used in your own discover sensitive data
scenarios.
- From the Provide credentials dialog, use the User
name and Password fields to provide credentials for the selected
databases. Click OK to return to the compliance monitoring database
view.
- From the compliance monitoring database view, select databases that have stored credentials and
click . Use Test connection to validate that the stored credentials allow
access to the database. If the connection test fails, the discovery and classification of sensitive
data will not work.
Important: - Testing connections can be time-intensive. It is not recommended to test a large number of
connections at once.
- If a connection test fails, navigate to , select the datasource, and validate the datasource definition. For example, you may
need to specify the correct port for Db2 for z/OS databases, correct mixed-case PostgreSQL database
names, or set other connection properties required for your environment.
- If a Microsoft SQL Server connection test fails, verify that the SQL Server
Browser Windows service is started.
Results
After enabling scanning for sensitive data, scan results and any changes made to the policy
(including changes to groups and group membership) become available after the policy is installed
according to the policy installation schedule.
By default, the quick start compliance monitoring tool defines a policy
installation schedule that runs daily at 10:30 AM.