From 36890c617358852719dacbc9787390f2d0d03bf4 Mon Sep 17 00:00:00 2001 From: jullyaline368-cybe Date: Mon, 30 Mar 2026 15:47:54 +0800 Subject: [PATCH] =?UTF-8?q?=E6=95=B0=E6=8D=AE=E8=84=B1=E6=95=8F-=E8=8B=B1?= =?UTF-8?q?=E6=96=87=E7=89=88?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- docs/manual/admin/console/access_control/acls.en.md | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/docs/manual/admin/console/access_control/acls.en.md b/docs/manual/admin/console/access_control/acls.en.md index 2eed5946..acc29175 100644 --- a/docs/manual/admin/console/access_control/acls.en.md +++ b/docs/manual/admin/console/access_control/acls.en.md @@ -107,6 +107,11 @@ - Click the **Create** button on the **Permission Management > Data Masking** page and fill in the data masking rule information. ![V4_data_desensitive_1](../../../../img/V4_data_desensitive_1.png) +!!! tip "" + After completing the creation of data masking rules, connect to a database asset at the web terminal for testing and verification. Taking a PostgreSQL database as an example, after connecting to the designated PostgreSQL database asset via the web CLI, execute a query statement as shown in the following query example (where "password" is the specified masked column name). +![V4_commandfilter_1](../../../../img/V4_data_desensitive_2.png) + + !!! tip "" Detailed parameter descriptions: