Best practices when using permissions and masks
Permissions and masks can be created for
a table in a number of different implementations. This section will
explain some of the implementations that can be used to create permissions
and masks.
Creating permissions and masks
A number of considerations need to be determined to decide the best way to create permissions or masks.
Dependent objects
A number of considerations must be determined to decide how to handle dependent objects of the permissions and masks.
Additional operations
A number of considerations must be reviewed creating permissions or masks for a table.
Using RCAC on Multi-Formatted Logical Files
A multiple format logical file contains either more than one record format or has more than one file that is specified on the PFILE keyword (DDS) of a logical file.
Propagation of masked data
Performing an insert or update operation into a base table with active column access control, the operation may fail because the data is the masked data.