Skip to content

Commit c3affb4

Browse files
committed
refine the post
1 parent 6c2890f commit c3affb4

File tree

1 file changed

+9
-6
lines changed

1 file changed

+9
-6
lines changed

packages/doc/blog/data-privacy-mechanisms.mdx

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -97,11 +97,14 @@ You can understand more about [the row-level security mechanism in VulcanSQL her
9797

9898
## Showcase
9999

100-
Now we are going to show you the code to demonstrate how you can deliver data privacy mechanisms in SQL templates!
100+
Now we are going to show you the code to demonstrate how you can deliver data privacy mechanisms in VulcanSQL!
101+
For those who may not familiar with VulcanSQL yet, **VulcanSQL is a Data API framework for data folks to create REST APIs
102+
easily by writing templated SQL! It's mainly used for sharing data from databases, data warehouses and data lakes!**
103+
101104
If you would like to read the source code or try the example by yourself,
102105
welcome to [check it out here](https://github.com/Canner/vulcan-sql-examples/tree/main/data-sharing)!
103106

104-
Below is the sample dataset we'll use in the showcase:
107+
Below is the dataset we'll use in the showcase:
105108

106109
|id|department|last_name|company_role|annual_salary|
107110
|---|---|---|---|---|
@@ -206,7 +209,7 @@ The REST API results you'll see based on different users:
206209
|ONxxxxxxx24|engineering|Cindy|manager|$115,000|
207210
|NZxxxxxxx24|ceo|Rosa|boss|$150,000|
208211

209-
After observing the result tables shown above and the given SQL templates,
212+
After observing the result tables shown above and the given SQL template,
210213
we can clearly figure out several data privacy mechanisms provided by VulcanSQL:
211214

212215
1. Authentication: In the above example, we used HTTP Basic as the authentication method
@@ -215,9 +218,9 @@ and the password of each user was stored in a text file called `passwd.txt`.
215218
With these user attributes defined, we can have more fine grained control on what kind of data
216219
each user should access.
217220
3. Dynamic Data Masking: `{% masking id partial(2, 'xxxxxxx', 2) %} as id` makes only the first two and
218-
last two digits of id visible, and the rest is masked.
219-
4. Column-level Security: We can see that only the user who is in the employer role can see the salary field,
220-
so Rosa is the only one in this role.
221+
last two digits of `id` visible, and the rest is masked.
222+
4. Column-level Security: We can see that only the user who is in the employer role can see the data in the salary field,
223+
so Rosa is the only person who can see other people's salary.
221224
5. Row-level Security: We can see a user who is not in the employer role can only see the data
222225
in the same department as he/she.
223226

0 commit comments

Comments
 (0)