All Products
Search
Document Center

Data Security Center:Methods for authorizing DSC to access data assets

Last Updated:Jul 17, 2023

This topic describes the methods for authorizing Data Security Center (DSC) to access different types of data assets.

You can use the following methods to authorize DSC to access different types of data assets: one-click authorization and username and password-based authorization.
  • One-click authorization allows you to authorize DSC to access a data asset with one click in the DSC console. You do not need to enter the username and password that are used to access the data asset. During the authorization process, DSC automatically generates a read-only account that is used to read data from the data asset. You cannot use the account to perform de-identification tasks.
  • Username and password-based authorization allows you to authorize DSC to access a data asset by entering the username and password that are used to access the data asset. After you authorize DSC to access a data asset, DSC can detect, de-identify, and audit the sensitive data in the data asset. You can de-identify the detected sensitive data based on your business requirements.
Type of data assetOne-click authorizationUsername and password-based authorization
ApsaraDB RDS for SQL ServerSupportedSupported
ApsaraDB RDS for PostgreSQLSupportedSupported
ApsaraDB RDS for MariaDBSupportedSupported
Distributed Relational Database Service (DRDS)SupportedSupported
AnalyticDB for MySQLNot supportedSupported
AnalyticDB for PostgreSQLNot supportedSupported
MaxComputeNot supportedSupported
Object Storage Service (OSS)SupportedSupported
PolarDB-XNot supportedSupported
PolarDB for MySQLNot supportedSupported
PolarDB for PostgreSQLNot supportedSupported
Self-managed MySQL databases hosted on Elastic Compute Service (ECS) instancesNot supportedSupported
ApsaraDB OceanBase for MySQLNot supportedSupported
ApsaraDB OceanBase for OracleNot supportedSupported
ApsaraDB for MongoDBNot supportedSupported