{"id":13242,"date":"2019-10-09T13:47:04","date_gmt":"2019-10-09T17:47:04","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=13242"},"modified":"2024-08-14T09:33:13","modified_gmt":"2024-08-14T13:33:13","slug":"connecting-masking-data-salesforce","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/","title":{"rendered":"Connecting to, and Masking Data, in Salesforce"},"content":{"rendered":"<p><a href=\"https:\/\/www.iri.com\/products\/workbench\"><span style=\"font-weight: 400;\">IRI Workbench<\/span><\/a><span style=\"font-weight: 400;\"> users can connect to and manipulate the data in the underlying database in Salesforce using the JDBC and ODBC drivers from CData or Progress Software.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Step one is to make sure that the Salesforce user has a Security Token by following <\/span><a href=\"https:\/\/help.salesforce.com\/articleView?id=user_security_token.htm&amp;type=5\"><span style=\"font-weight: 400;\">these<\/span><\/a><span style=\"font-weight: 400;\">\u00a0instructions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Download and install both the <\/span><a href=\"https:\/\/www.progress.com\/jdbc\/salesforce\"><span style=\"font-weight: 400;\">JDBC<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.progress.com\/odbc\/salesforce\"><span style=\"font-weight: 400;\">ODBC<\/span><\/a><span style=\"font-weight: 400;\"> drivers from CData or Progress per the instructions in their installation guides. When following the ODBC instructions, create a Default Data Source which will create a DSN for you. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This article covers masking with the <a href=\"https:\/\/www.iri.com\/products\/fieldshield\">IRI FieldShield<\/a> data masking tool, but if you want to use <a href=\"https:\/\/www.iri.com\/products\/darkshield\">DarkShield<\/a> (see <a href=\"https:\/\/www.iri.com\/company\/faqs\/190\">this<\/a> comparison), you will only need a JDBC connection. Either can find and anonymize PII in the backend database, and thus deliver a granular and compliant Salesforce data security solution.<\/span><\/p>\n<h4><b>JDBC<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">In Workbench, in the <\/span><i><span style=\"font-weight: 400;\">Data Source Explorer<\/span><\/i><span style=\"font-weight: 400;\">, create a new connection profile. Select the <\/span><i><span style=\"font-weight: 400;\">Generic JDBC<\/span><\/i><span style=\"font-weight: 400;\">. Change the name and click <\/span><b>Next<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_connection_profile.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13244 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_connection_profile.png\" alt=\"salesforce_connection_profile\" width=\"449\" height=\"510\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_connection_profile.png 511w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_connection_profile-264x300.png 264w\" sizes=\"(max-width: 449px) 100vw, 449px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">On the next page, add a new driver definition. On the <\/span><i><span style=\"font-weight: 400;\">Name\/Type<\/span><\/i><span style=\"font-weight: 400;\"> tab, enter a custom driver name. In the <\/span><i><span style=\"font-weight: 400;\">JAR List<\/span><\/i><span style=\"font-weight: 400;\"> tab, for example, select the sforce.jar file from the Progress installation directory (on Windows: \u201cC:\\Program Files\\Progress\\DataDirect\\JDBC_60\\lib\u201d). In the <\/span><i><span style=\"font-weight: 400;\">Properties <\/span><\/i><span style=\"font-weight: 400;\">tab, enter \u201cjdbc:datadirect:sforce:\/\/login.salesforce.com;\u201d in the <\/span><b>Connection URL<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Enter the <\/span><b>Database Name<\/b> <i><span style=\"font-weight: 400;\">login.salesforce.com<\/span><\/i><span style=\"font-weight: 400;\">. Click in the box next to <\/span><b>Driver Class<\/b><span style=\"font-weight: 400;\"> and click the dialog button. Select the <\/span><i><span style=\"font-weight: 400;\">SForceDriver<\/span><\/i><span style=\"font-weight: 400;\">. Details will look like the screen below. Click <\/span><b>OK<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_edit_driver.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13247 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_edit_driver.png\" alt=\"salesforce_edit_driver\" width=\"600\" height=\"505\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_edit_driver.png 586w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_edit_driver-300x252.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Back on the New Connection Profile page, append to the URL, the user, password, and security token. The format will look like this:\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">jdbc:datadirect:sforce:\/\/login.salesforce.com;User=&lt;user&gt;;Password=&lt;password&gt;;SecurityToken=&lt;securityToken&gt;<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Also enter a user name and password in the next two fields. Do not append the security token to the password field. Click <\/span><b>Save password<\/b><span style=\"font-weight: 400;\">. Test the connection to make sure the settings are correct. Click <\/span><b>OK<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_JDBC_connection.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13248 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_JDBC_connection.png\" alt=\"salesforce_JDBC_connection\" width=\"601\" height=\"388\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_JDBC_connection.png 687w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_JDBC_connection-300x193.png 300w\" sizes=\"(max-width: 601px) 100vw, 601px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">The tables are now visible under the SFORCE schema in the <\/span><i><span style=\"font-weight: 400;\">Data Source Explorer<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_connection_explorer.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-13249 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_connection_explorer.png\" alt=\"salesforce_connection_explorer\" width=\"310\" height=\"340\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_connection_explorer.png 310w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_connection_explorer-274x300.png 274w\" sizes=\"(max-width: 310px) 100vw, 310px\" \/><\/a><\/p>\n<h4><b>ODBC\u00a0<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">In Workbench, open <\/span><b>Preferences &gt; IRI &gt; Data Connection Registry<\/b><span style=\"font-weight: 400;\">. If the new Salesforce DSN is not visible, click <\/span><b>Refresh<\/b><span style=\"font-weight: 400;\">. Then double-click the entry to edit it. Enter a schema filter if desired.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the <\/span><i><span style=\"font-weight: 400;\">Authentication <\/span><\/i><span style=\"font-weight: 400;\">section, click to add authentication. Enter the user and password (not appended with the security token). In mapping, select the JDBC connection set up previously. Click <\/span><b>OK<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_data_connection.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13250 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_data_connection.png\" alt=\"salesforce_data_connection\" width=\"451\" height=\"505\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_data_connection.png 511w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_data_connection-268x300.png 268w\" sizes=\"(max-width: 451px) 100vw, 451px\" \/><\/a><\/p>\n<h4><b>Data Transformation<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Using Salesforce as a data source works just like any other relational database in Workbench. The data can thus be retrieved, transformed and loaded using various wizards depending on your project requirements.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you license the <\/span><a href=\"https:\/\/www.iri.com\/products\/voracity\"><span style=\"font-weight: 400;\">IRI Voracity<\/span><\/a><span style=\"font-weight: 400;\"> platform, you can use Workbench wizards to perform ETL, data cleansing, subsetting, migration, replication, federation, masking, reporting, wrangling, test data generation, and more, on Salesforce and other data sources. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this example however, we will use an <\/span><a href=\"http:\/\/www.iri.com\/products\/fieldshield\"><span style=\"font-weight: 400;\">IRI FieldShield<\/span><\/a><span style=\"font-weight: 400;\"> data masking wizard in Workbench to configure the redaction of the phone # and encryption of the street address in a specific record; our sales team would be a little upset if this job masked all of their accounts for an article.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here is the record in Salesforce before starting the masking job:<\/span><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13251 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin-1024x271.png\" alt=\"salesforce_iri_admin\" width=\"781\" height=\"207\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin-1024x271.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin-300x79.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin-768x203.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin.png 1063w\" sizes=\"(max-width: 781px) 100vw, 781px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Using <\/span><i><span style=\"font-weight: 400;\">New Multi Table Masking Job<\/span><\/i><span style=\"font-weight: 400;\"> wizard, <\/span><i><span style=\"font-weight: 400;\">ODBC <\/span><\/i><span style=\"font-weight: 400;\">is selected as a loader.\u00a0<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_define_destination.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13252 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_define_destination.png\" alt=\"salesforce_define_destination\" width=\"601\" height=\"408\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_define_destination.png 717w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_define_destination-300x204.png 300w\" sizes=\"(max-width: 601px) 100vw, 601px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Table <\/span><i><span style=\"font-weight: 400;\">ACCOUNTS <\/span><\/i><span style=\"font-weight: 400;\">is selected for the source.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_data_extraction.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13253 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_data_extraction.png\" alt=\"salesforce_data_extraction\" width=\"600\" height=\"407\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_data_extraction.png 717w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_data_extraction-300x204.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Create two rules, each with a different data masking technique. The first can be a redaction rule applied to values in the PHONE column. The second might be format-preserving encryption applied to <\/span><i><span style=\"font-weight: 400;\">BILLINGSTREET<\/span><\/i><span style=\"font-weight: 400;\">, as shown below.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_field_modification.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13254 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_field_modification.png\" alt=\"salesforce_field_modification\" width=\"601\" height=\"408\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_field_modification.png 717w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_field_modification-300x204.png 300w\" sizes=\"(max-width: 601px) 100vw, 601px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Select <\/span><i><span style=\"font-weight: 400;\">UPDATE <\/span><\/i><span style=\"font-weight: 400;\">on the load screen to minimize the amount of data that the job has to read by only updating the masked fields.\u00a0<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_data_loading.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13255 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_data_loading.png\" alt=\"salesforce_data_loading\" width=\"601\" height=\"408\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_data_loading.png 717w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_data_loading-300x204.png 300w\" sizes=\"(max-width: 601px) 100vw, 601px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">The summary page shows the job with the two columns that will be transformed by the job. Click <\/span><b>Finish<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_summary.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13256 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_summary.png\" alt=\"salesforce_summary\" width=\"601\" height=\"408\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_summary.png 717w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_summary-300x204.png 300w\" sizes=\"(max-width: 601px) 100vw, 601px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">An include filter is adding to the resulting script to manipulate only one record. The final script is shown below.<\/span><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_final_script.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13258 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_final_script-1024x358.png\" alt=\"salesforce_final_script\" width=\"781\" height=\"273\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_final_script-1024x358.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_final_script-300x105.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_final_script-768x269.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_final_script.png 1069w\" sizes=\"(max-width: 781px) 100vw, 781px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">As shown below, the record is changed in Salesforce\u2019s underlying database by redacting the phone and encrypting the street address.<\/span><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin_masked.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13257 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin_masked-1024x266.png\" alt=\"salesforce_iri_admin_masked\" width=\"781\" height=\"203\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin_masked-1024x266.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin_masked-300x78.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin_masked-768x199.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin_masked.png 1067w\" sizes=\"(max-width: 781px) 100vw, 781px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">With Progress or CData drivers, connection to the Salesforce schema and data in IRI Workbench provides tools to perform data discovery, integration, migration, governance, and analytics <\/span><a href=\"https:\/\/www.iri.com\/products\/voracity\/technical-details#capabilities\"><span style=\"font-weight: 400;\">capabilities<\/span><\/a><span style=\"font-weight: 400;\"> in the IRI Voracity ecosystem, just like other connected data sources and targets. In this case, we used the IRI FieldShield data privacy software to mask data in the Salesforce backend database for CRM data protection.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IRI Workbench users can connect to and manipulate the data in the underlying database in Salesforce using the JDBC and ODBC drivers from CData or Progress Software.\u00a0 Step one is to make sure that the Salesforce user has a Security Token by following these\u00a0instructions. Download and install both the JDBC and ODBC drivers from CData<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/\" title=\"Connecting to, and Masking Data, in Salesforce\">Read More<\/a><\/div>\n","protected":false},"author":43,"featured_media":13257,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,91],"tags":[1903,14,1900,13,519,9,92,520,850,956,75,1443,1899,1902,1901],"class_list":["post-13242","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-iri-workbench","tag-crm-data-protection","tag-data-masking","tag-data-privacy-soffware","tag-data-protection-2","tag-database","tag-fieldshield","tag-gui","tag-iri-fieldshield","tag-iri-workbench","tag-jdbc","tag-odbc","tag-salesforce","tag-salesforce-compliance-solutions","tag-salesforce-data-masking","tag-salesforce-data-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Connecting to, and Masking Data, in Salesforce - IRI<\/title>\n<meta name=\"description\" content=\"Learn to connect to and mask PII data in the internal database of Salesforce using the DataDirect JDBC and ODBC drivers with IRI FieldShield.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Connecting to, and Masking Data, in Salesforce\" \/>\n<meta property=\"og:description\" content=\"Learn to connect to and mask PII data in the internal database of Salesforce using the DataDirect JDBC and ODBC drivers with IRI FieldShield.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-09T17:47:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-14T13:33:13+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin_masked.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1067\" \/>\n\t<meta property=\"og:image:height\" content=\"277\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Claudia Irvine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Claudia Irvine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/\"},\"author\":{\"name\":\"Claudia Irvine\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/72af50bbb317610e193e96392081f9b0\"},\"headline\":\"Connecting to, and Masking Data, in Salesforce\",\"datePublished\":\"2019-10-09T17:47:04+00:00\",\"dateModified\":\"2024-08-14T13:33:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/\"},\"wordCount\":743,\"commentCount\":9,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin_masked.png\",\"keywords\":[\"crm data protection\",\"data masking\",\"data privacy soffware\",\"data protection\",\"database\",\"FieldShield\",\"GUI\",\"IRI FieldShield\",\"IRI Workbench\",\"JDBC\",\"ODBC\",\"salesforce\",\"salesforce compliance solutions\",\"salesforce data masking\",\"salesforce data security\"],\"articleSection\":[\"Data Masking\/Protection\",\"IRI Workbench\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/\",\"name\":\"Connecting to, and Masking Data, in Salesforce - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin_masked.png\",\"datePublished\":\"2019-10-09T17:47:04+00:00\",\"dateModified\":\"2024-08-14T13:33:13+00:00\",\"description\":\"Learn to connect to and mask PII data in the internal database of Salesforce using the DataDirect JDBC and ODBC drivers with IRI FieldShield.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin_masked.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin_masked.png\",\"width\":1067,\"height\":277,\"caption\":\"salesforce_iri_admin_masked\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Connecting to, and Masking Data, in Salesforce\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/72af50bbb317610e193e96392081f9b0\",\"name\":\"Claudia Irvine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fb33dee44756bd13ac23f1342c2bb7b2?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fb33dee44756bd13ac23f1342c2bb7b2?s=96&d=blank&r=g\",\"caption\":\"Claudia Irvine\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/claudiai\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Connecting to, and Masking Data, in Salesforce - IRI","description":"Learn to connect to and mask PII data in the internal database of Salesforce using the DataDirect JDBC and ODBC drivers with IRI FieldShield.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/","og_locale":"en_US","og_type":"article","og_title":"Connecting to, and Masking Data, in Salesforce","og_description":"Learn to connect to and mask PII data in the internal database of Salesforce using the DataDirect JDBC and ODBC drivers with IRI FieldShield.","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/","og_site_name":"IRI","article_published_time":"2019-10-09T17:47:04+00:00","article_modified_time":"2024-08-14T13:33:13+00:00","og_image":[{"width":1067,"height":277,"url":"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin_masked.png","type":"image\/png"}],"author":"Claudia Irvine","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Claudia Irvine","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/"},"author":{"name":"Claudia Irvine","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/72af50bbb317610e193e96392081f9b0"},"headline":"Connecting to, and Masking Data, in Salesforce","datePublished":"2019-10-09T17:47:04+00:00","dateModified":"2024-08-14T13:33:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/"},"wordCount":743,"commentCount":9,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin_masked.png","keywords":["crm data protection","data masking","data privacy soffware","data protection","database","FieldShield","GUI","IRI FieldShield","IRI Workbench","JDBC","ODBC","salesforce","salesforce compliance solutions","salesforce data masking","salesforce data security"],"articleSection":["Data Masking\/Protection","IRI Workbench"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/","name":"Connecting to, and Masking Data, in Salesforce - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin_masked.png","datePublished":"2019-10-09T17:47:04+00:00","dateModified":"2024-08-14T13:33:13+00:00","description":"Learn to connect to and mask PII data in the internal database of Salesforce using the DataDirect JDBC and ODBC drivers with IRI FieldShield.","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin_masked.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin_masked.png","width":1067,"height":277,"caption":"salesforce_iri_admin_masked"},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/connecting-masking-data-salesforce\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Connecting to, and Masking Data, in Salesforce"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/72af50bbb317610e193e96392081f9b0","name":"Claudia Irvine","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fb33dee44756bd13ac23f1342c2bb7b2?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fb33dee44756bd13ac23f1342c2bb7b2?s=96&d=blank&r=g","caption":"Claudia Irvine"},"url":"https:\/\/www.iri.com\/blog\/author\/claudiai\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/10\/salesforce_iri_admin_masked.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/13242"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=13242"}],"version-history":[{"count":8,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/13242\/revisions"}],"predecessor-version":[{"id":17890,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/13242\/revisions\/17890"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/13257"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=13242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=13242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=13242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}