Skip to content

Commit f3d6940

Browse files
Live Publish (02/25/2025 05:00:00 PM)
2 parents 844732d + 25aaf3f commit f3d6940

File tree

6 files changed

+73
-63
lines changed

6 files changed

+73
-63
lines changed

power-platform/admin/about-lockbox.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,15 @@ description: This article covers information on how customers can review and app
44
ms.subservice: admin
55
ms.component: pa-admin
66
ms.topic: conceptual
7-
ms.date: 11/19/2024
7+
ms.date: 02/25/2024
88
author: mihaelablendea
99
ms.author: mihaelab
1010
ms.reviewer: sericks
1111
search.audienceType:
1212
- admin
1313
ms.collection: bap-ai-copilot
1414
contributors:
15+
- iaanw
1516
- kavehkazms
1617
---
1718
# Securely access customer data using Customer Lockbox in Power Platform and Dynamics 365
@@ -36,7 +37,7 @@ All updates to a lockbox request are recorded and made available to your organiz
3637
Power Platform and Dynamics 365 applications and services store customer data in several Azure storage technologies. When you turn on Customer Lockbox for an environment, customer data associated with the respective environment is protected by the lockbox policy, irrespective of the storage type.
3738

3839
> [!NOTE]
39-
> - Currently, the applications and services where lockbox policy is going to be enforced once enabled are Power Apps (excluding Cards for Power Apps), AI Builder, Power Pages, Power Automate, Microsoft Copilot Studio (excluding GPT AI features and Agent Builder), Dataverse, Customer Insights, Customer Service, Communities, Guides, Connected Spaces, Finance (except Lifecycle Services), Project Operations (except Lifecycle Services), Supply Chain Management (except Lifecycle Services), and the real-time marketing feature area of the Marketing app.
40+
> - Currently, the applications and services where lockbox policy is going to be enforced once enabled are Power Apps (excluding Cards for Power Apps), AI Builder, Power Pages, Power Automate, Microsoft Copilot Studio, Dataverse, Customer Insights, Customer Service, Communities, Guides, Connected Spaces, Finance (except Lifecycle Services), Project Operations (except Lifecycle Services), Supply Chain Management (except Lifecycle Services), and the real-time marketing feature area of the Marketing app.
4041
> - Features powered by Azure OpenAI Service are excluded from Lockbox policy enforcement unless product documentation for a given feature states that Lockbox applies.
4142
> - Nuance Conversational IVR is excluded from Lockbox policy enforcement unless product documentation for a given feature states that Lockbox applies.
4243
> - [Maker Welcome Content](welcome-content.md) is excluded from Lockbox policy enforcement.

power-platform/admin/create-manage-masking-rules.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ contributors:
1919

2020
[!INCLUDE [preview-banner](~/../shared-content/shared/preview-includes/preview-banner.md)]
2121

22-
Data masking helps protect sensitive information during customer interactions and prevents data leaks. Data masking, also known as de-identification or obfuscation, replaces sensitive data with masked strings. The masked strings ensure that the original, unmasked values remain hidden. Only authorized users can read the unmasked values—one record at a time. In the context of customer interactions, frontline support users are prevented from exposing sensitive information like credit card numbers, social security numbers, or any personal data (PII).
22+
Data masking helps protect sensitive information during customer interactions and prevents data leaks. Data masking, also known as de-identification or obfuscation, replaces sensitive data with masked strings. The masked strings ensure that the original, unmasked values remain hidden. Only authorized users can read the unmasked values—one record at a time. In the context of customer interactions, frontline support users are prevented from exposing sensitive information like credit card numbers, social security numbers, or any personal data.
2323

2424
> [!IMPORTANT]
2525
>
@@ -28,23 +28,23 @@ Data masking helps protect sensitive information during customer interactions an
2828
2929
## How does masking work?
3030

31-
- You can create *masking rules* to set how sensitive information should be masked.
31+
- You create *masking rules* to set how sensitive information should be masked.
3232

3333
- These rules use *regular expressions* to identify specific patterns, for example a credit card number, social security number, and email address.
3434

3535
- These patterns are detected and the sensitive fields are replaced with masked characters when the row is retrieved.
3636

3737
## Create masking rules
3838

39-
You get a predefined set of masking rules, to start, or you can create your own.
39+
Get a predefined set of masking rules, to start, or you can create your own.
4040

4141
1. Create a solution: [Create a solution in Power Apps](/power-apps/maker/data-platform/create-solution).
4242

4343
1. Create a new component: [Create components in a solution](/power-apps/maker/data-platform/create-solution#create-components-in-a-solution).
4444

4545
1. Select the **Security** menu option and choose **Secured masking rule**.
4646

47-
:::image type="content" source="media/create-and-manage-masking-rules/security-masking-rule-menu.png " alt-text="Screenshot that shows the location of the Secured masking rule button in Power Apps.":::
47+
:::image type="content" source="media/create-and-manage-masking-rules/security-masking-rule-menu.png " alt-text="Screenshot showing the location of the Secured masking rule button in Power Apps.":::
4848

4949
The **New Masking Rule** form appears.
5050

@@ -65,9 +65,9 @@ You get a predefined set of masking rules, to start, or you can create your own.
6565
6666
1. Enter a **Masked Character**, for example `#`.
6767

68-
1. Enter an original value in the **Enter Plain Text Test Data** field, for example a social security number, email address, etc.
68+
1. Enter an original value in the **Enter Plain Text Test Data** field, such as a social security number, or email address.
6969

70-
1. Enter an original value in the **Enter Rich Text Test Data** field, for example a social security number, email address, etc. (for testing Text Data type with Rich text format columns).
70+
1. Enter an original value in the **Enter Rich Text Test Data** field, such as a social security number, or email address (for testing Text Data type with Rich text format columns).
7171

7272
> [!NOTE]
7373
> For **Rich text** field, the raw value of the field needs to be taken into account when defining the **Regular Expression**. You can view the raw value using a Web API to query the table/column with rich text. For example,
@@ -80,7 +80,7 @@ You get a predefined set of masking rules, to start, or you can create your own.
8080
8181
1. Select **Save**.
8282

83-
Now you see **Masked Plain Text test data**, and **Masked Rich Text test data**.
83+
**Masked Plain Text test data**, and **Masked Rich Text test data** display on the screen.
8484

8585
Your masked values might be masked like this:
8686

@@ -92,7 +92,7 @@ You get a predefined set of masking rules, to start, or you can create your own.
9292
| `(?:4[0-9]{12}(?:[0-9]{3})?|[25][1-7][0-9]{14}|6(?:011|5[0-9][0-9])[0-9]{12}|3[47][0-9]{13}|3(?:0[0-5]|[68][0-9])[0-9]{11}|(?:2131|1800|35\d{3})\d{11})` | **Visa** `4567891234567891` | **Visa** `#` |
9393
| `\S+@\S+\.\S+` | **Email** `[email protected]` | **Email** `#` |
9494

95-
When a customer sends you an email with sensitive data and the email has this masking rule, you see the masked values only in the body of an email:
95+
When a customer sends you an email with sensitive data and the email has this masking rule, only the masked values display in the body of the email:
9696

9797
:::image type="content" source="media/create-and-manage-masking-rules/masking-rule-applied.png" alt-text="Screensot showing the result of applying the masking rule in the body of the email.":::
9898

@@ -102,7 +102,7 @@ You get a predefined set of masking rules, to start, or you can create your own.
102102

103103
1. Go to the [Power Apps portal](https://make.powerapps.com).
104104

105-
1. Select the environment where you want to see the list of masking rules.
105+
1. Select the environment where you want to display the list of masking rules.
106106

107107
1. Select **Tables** and choose the **All** filter.
108108

@@ -124,7 +124,7 @@ You get a predefined set of masking rules, to start, or you can create your own.
124124

125125
:::image type="content" source="media/create-and-manage-masking-rules/select-columns-schema.png" alt-text="Screenshot that shows the location of the Columns option under the Schema section." lightbox="media/create-and-manage-masking-rules/select-columns-schema.png":::
126126

127-
1. Select a column to open and edit it. You see the **Edit column** pane.
127+
1. Select a column to open and edit it. The **Edit column** pane displays.
128128

129129
1. Expand **Advanced options**.
130130

@@ -139,7 +139,7 @@ You get a predefined set of masking rules, to start, or you can create your own.
139139
1. Select **Save**.
140140

141141
> [!NOTE]
142-
> Data types that masking rule can be set:
142+
> Data types for masking rules:
143143
> 1. Text (single-line and multi-line).
144144
> 1. Number.
145145
@@ -153,26 +153,26 @@ Users or Teams groups can be granted access through column security:
153153

154154
- **Read**
155155

156-
**Allowed** - Read secured column is allowed. Masked values are shown if masking rule is applied to the column.
156+
**Allowed**: Read secured column is allowed. Masked values are shown if masking rule is applied to the column.
157157

158158
- **Read unmasked**
159159

160-
**Not Allowed** - When **Read** is allowed and **Read unmasked** isn't allowed, masked values are shown.
160+
**Not Allowed**: When **Read** is allowed and **Read unmasked** isn't allowed, masked values are shown.
161161

162-
**One Record** Users are allowed to read unmasked values. Unmasked values are only returned when you request one record at a time. These values should be allowed for users who manage and maintain secured columns.
162+
**One Record**: Users are allowed to read unmasked values. Unmasked values are only returned when you request one record at a time. These values should be allowed for users who manage and maintain secured columns.
163163

164-
**All records** Users are allowed to retrieve and read multiple records with unmasked values. This setting is highly privileged. **Read unmasked** should only be allowed for backend services that require unmasked values for backend processing.
164+
**All records**: Users are allowed to retrieve and read multiple records with unmasked values. This setting is highly privileged. **Read unmasked** should only be allowed for backend services that require unmasked values for backend processing.
165165

166166
- **Update**
167167

168-
**Allowed** - Users are allowed to update records.
168+
**Allowed**: Users are allowed to update records.
169169

170170
- **Create**
171171

172-
**Allowed** - Users are allowed to create records.
172+
**Allowed**: Users are allowed to create records.
173173

174174
> [!NOTE]
175-
> System and application users with **Read** and **Read unmasked** permissions will get masked values by default. To read unmasked values, see [options for viewing masked fields](#options-for-viewing-masked-fields).
175+
> System and application users with **Read** and **Read unmasked** permissions get masked values by default. To read unmasked values, go to [options for viewing masked fields](#options-for-viewing-masked-fields).
176176
177177
### View all columns that have a masking rule
178178

@@ -235,4 +235,4 @@ In these examples, replace `<url>`, `<table collection name>`, and `<recordid>`
235235

236236
- **Audit log**
237237

238-
Unmasked values are displayed in the audit log. In future releases, these will be masked with option to read unmasked for users who have **Read unmasked** permission.
238+
Unmasked values are displayed in the audit log. In future releases, these are masked with option to read unmasked for users who have **Read unmasked** permission.

0 commit comments

Comments
 (0)