You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: power-platform/admin/about-lockbox.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,14 +4,15 @@ description: This article covers information on how customers can review and app
4
4
ms.subservice: admin
5
5
ms.component: pa-admin
6
6
ms.topic: conceptual
7
-
ms.date: 11/19/2024
7
+
ms.date: 02/25/2024
8
8
author: mihaelablendea
9
9
ms.author: mihaelab
10
10
ms.reviewer: sericks
11
11
search.audienceType:
12
12
- admin
13
13
ms.collection: bap-ai-copilot
14
14
contributors:
15
+
- iaanw
15
16
- kavehkazms
16
17
---
17
18
# Securely access customer data using Customer Lockbox in Power Platform and Dynamics 365
@@ -36,7 +37,7 @@ All updates to a lockbox request are recorded and made available to your organiz
36
37
Power Platform and Dynamics 365 applications and services store customer data in several Azure storage technologies. When you turn on Customer Lockbox for an environment, customer data associated with the respective environment is protected by the lockbox policy, irrespective of the storage type.
37
38
38
39
> [!NOTE]
39
-
> - Currently, the applications and services where lockbox policy is going to be enforced once enabled are Power Apps (excluding Cards for Power Apps), AI Builder, Power Pages, Power Automate, Microsoft Copilot Studio (excluding GPT AI features and Agent Builder), Dataverse, Customer Insights, Customer Service, Communities, Guides, Connected Spaces, Finance (except Lifecycle Services), Project Operations (except Lifecycle Services), Supply Chain Management (except Lifecycle Services), and the real-time marketing feature area of the Marketing app.
40
+
> - Currently, the applications and services where lockbox policy is going to be enforced once enabled are Power Apps (excluding Cards for Power Apps), AI Builder, Power Pages, Power Automate, Microsoft Copilot Studio, Dataverse, Customer Insights, Customer Service, Communities, Guides, Connected Spaces, Finance (except Lifecycle Services), Project Operations (except Lifecycle Services), Supply Chain Management (except Lifecycle Services), and the real-time marketing feature area of the Marketing app.
40
41
> - Features powered by Azure OpenAI Service are excluded from Lockbox policy enforcement unless product documentation for a given feature states that Lockbox applies.
41
42
> - Nuance Conversational IVR is excluded from Lockbox policy enforcement unless product documentation for a given feature states that Lockbox applies.
42
43
> -[Maker Welcome Content](welcome-content.md) is excluded from Lockbox policy enforcement.
Data masking helps protect sensitive information during customer interactions and prevents data leaks. Data masking, also known as de-identification or obfuscation, replaces sensitive data with masked strings. The masked strings ensure that the original, unmasked values remain hidden. Only authorized users can read the unmasked values—one record at a time. In the context of customer interactions, frontline support users are prevented from exposing sensitive information like credit card numbers, social security numbers, or any personal data (PII).
22
+
Data masking helps protect sensitive information during customer interactions and prevents data leaks. Data masking, also known as de-identification or obfuscation, replaces sensitive data with masked strings. The masked strings ensure that the original, unmasked values remain hidden. Only authorized users can read the unmasked values—one record at a time. In the context of customer interactions, frontline support users are prevented from exposing sensitive information like credit card numbers, social security numbers, or any personal data.
23
23
24
24
> [!IMPORTANT]
25
25
>
@@ -28,23 +28,23 @@ Data masking helps protect sensitive information during customer interactions an
28
28
29
29
## How does masking work?
30
30
31
-
- You can create *masking rules* to set how sensitive information should be masked.
31
+
- You create *masking rules* to set how sensitive information should be masked.
32
32
33
33
- These rules use *regular expressions* to identify specific patterns, for example a credit card number, social security number, and email address.
34
34
35
35
- These patterns are detected and the sensitive fields are replaced with masked characters when the row is retrieved.
36
36
37
37
## Create masking rules
38
38
39
-
You get a predefined set of masking rules, to start, or you can create your own.
39
+
Get a predefined set of masking rules, to start, or you can create your own.
40
40
41
41
1. Create a solution: [Create a solution in Power Apps](/power-apps/maker/data-platform/create-solution).
42
42
43
43
1. Create a new component: [Create components in a solution](/power-apps/maker/data-platform/create-solution#create-components-in-a-solution).
44
44
45
45
1. Select the **Security** menu option and choose **Secured masking rule**.
46
46
47
-
:::image type="content" source="media/create-and-manage-masking-rules/security-masking-rule-menu.png " alt-text="Screenshot that shows the location of the Secured masking rule button in Power Apps.":::
47
+
:::image type="content" source="media/create-and-manage-masking-rules/security-masking-rule-menu.png " alt-text="Screenshot showing the location of the Secured masking rule button in Power Apps.":::
48
48
49
49
The **New Masking Rule** form appears.
50
50
@@ -65,9 +65,9 @@ You get a predefined set of masking rules, to start, or you can create your own.
65
65
66
66
1. Enter a **Masked Character**, for example `#`.
67
67
68
-
1. Enter an original value in the **Enter Plain Text Test Data** field, for example a social security number, email address, etc.
68
+
1. Enter an original value in the **Enter Plain Text Test Data** field, such as a social security number, or email address.
69
69
70
-
1. Enter an original value in the **Enter Rich Text Test Data** field, for example a social security number, email address, etc. (for testing Text Data type with Rich text format columns).
70
+
1. Enter an original value in the **Enter Rich Text Test Data** field, such as a social security number, or email address (for testing Text Data type with Rich text format columns).
71
71
72
72
> [!NOTE]
73
73
> For **Rich text** field, the raw value of the field needs to be taken into account when defining the **Regular Expression**. You can view the raw value using a Web API to query the table/column with rich text. For example,
@@ -80,7 +80,7 @@ You get a predefined set of masking rules, to start, or you can create your own.
80
80
81
81
1. Select **Save**.
82
82
83
-
Now you see **Masked Plain Text test data**, and **Masked Rich Text test data**.
83
+
**Masked Plain Text test data**, and **Masked Rich Text test data** display on the screen.
84
84
85
85
Your masked values might be masked like this:
86
86
@@ -92,7 +92,7 @@ You get a predefined set of masking rules, to start, or you can create your own.
When a customer sends you an email with sensitive data and the email has this masking rule, you see the masked values only in the body of an email:
95
+
When a customer sends you an email with sensitive data and the email has this masking rule, only the masked values display in the body of the email:
96
96
97
97
:::image type="content" source="media/create-and-manage-masking-rules/masking-rule-applied.png" alt-text="Screensot showing the result of applying the masking rule in the body of the email.":::
98
98
@@ -102,7 +102,7 @@ You get a predefined set of masking rules, to start, or you can create your own.
102
102
103
103
1. Go to the [Power Apps portal](https://make.powerapps.com).
104
104
105
-
1. Select the environment where you want to see the list of masking rules.
105
+
1. Select the environment where you want to display the list of masking rules.
106
106
107
107
1. Select **Tables** and choose the **All** filter.
108
108
@@ -124,7 +124,7 @@ You get a predefined set of masking rules, to start, or you can create your own.
124
124
125
125
:::image type="content" source="media/create-and-manage-masking-rules/select-columns-schema.png" alt-text="Screenshot that shows the location of the Columns option under the Schema section." lightbox="media/create-and-manage-masking-rules/select-columns-schema.png":::
126
126
127
-
1. Select a column to open and edit it. You see the **Edit column** pane.
127
+
1. Select a column to open and edit it. The **Edit column** pane displays.
128
128
129
129
1. Expand **Advanced options**.
130
130
@@ -139,7 +139,7 @@ You get a predefined set of masking rules, to start, or you can create your own.
139
139
1. Select **Save**.
140
140
141
141
> [!NOTE]
142
-
> Data types that masking rule can be set:
142
+
> Data types for masking rules:
143
143
> 1. Text (single-line and multi-line).
144
144
> 1. Number.
145
145
@@ -153,26 +153,26 @@ Users or Teams groups can be granted access through column security:
153
153
154
154
-**Read**
155
155
156
-
**Allowed** - Read secured column is allowed. Masked values are shown if masking rule is applied to the column.
156
+
**Allowed**: Read secured column is allowed. Masked values are shown if masking rule is applied to the column.
157
157
158
158
-**Read unmasked**
159
159
160
-
**Not Allowed** - When **Read** is allowed and **Read unmasked** isn't allowed, masked values are shown.
160
+
**Not Allowed**: When **Read** is allowed and **Read unmasked** isn't allowed, masked values are shown.
161
161
162
-
**One Record** – Users are allowed to read unmasked values. Unmasked values are only returned when you request one record at a time. These values should be allowed for users who manage and maintain secured columns.
162
+
**One Record**: Users are allowed to read unmasked values. Unmasked values are only returned when you request one record at a time. These values should be allowed for users who manage and maintain secured columns.
163
163
164
-
**All records** – Users are allowed to retrieve and read multiple records with unmasked values. This setting is highly privileged. **Read unmasked** should only be allowed for backend services that require unmasked values for backend processing.
164
+
**All records**: Users are allowed to retrieve and read multiple records with unmasked values. This setting is highly privileged. **Read unmasked** should only be allowed for backend services that require unmasked values for backend processing.
165
165
166
166
-**Update**
167
167
168
-
**Allowed** - Users are allowed to update records.
168
+
**Allowed**: Users are allowed to update records.
169
169
170
170
-**Create**
171
171
172
-
**Allowed** - Users are allowed to create records.
172
+
**Allowed**: Users are allowed to create records.
173
173
174
174
> [!NOTE]
175
-
> System and application users with **Read** and **Read unmasked** permissions will get masked values by default. To read unmasked values, see[options for viewing masked fields](#options-for-viewing-masked-fields).
175
+
> System and application users with **Read** and **Read unmasked** permissions get masked values by default. To read unmasked values, go to[options for viewing masked fields](#options-for-viewing-masked-fields).
176
176
177
177
### View all columns that have a masking rule
178
178
@@ -235,4 +235,4 @@ In these examples, replace `<url>`, `<table collection name>`, and `<recordid>`
235
235
236
236
-**Audit log**
237
237
238
-
Unmasked values are displayed in the audit log. In future releases, these will be masked with option to read unmasked for users who have **Read unmasked** permission.
238
+
Unmasked values are displayed in the audit log. In future releases, these are masked with option to read unmasked for users who have **Read unmasked** permission.
0 commit comments