Hi @gary.pei ,
I believe that the pseudonymization is done at the source system by Celonis, so when you specify the fields to pseudonymize the data didn't reach the Celonis Cloud yet.
Hi @gary.pei ,
I believe that the pseudonymization is done at the source system by Celonis, so when you specify the fields to pseudonymize the data didn't reach the Celonis Cloud yet.
I believe that normally to do that they would have to upload the data with pseudonymization to some other platform and then you can extract it from there. Then it really depends on the source system, some of them allow for an export with pseudonymization. https://docs.celonis.com/en/extractions.html#UUID-a8c152e2-5bda-9a10-8bb0-d9e5f20a175e_id_Extractions-pseudonymizationPseudonymization
Hi @gary.pei,
If you use the Celonis SAP/JDBC Extractor that is installed on a server within the customer network, the data will be pseudonimized within the extractor and thus before it is loaded towards Celonis (see Attached image where the extractor is marked red). You can also use the extractor to extract data from a cloud application and then load it to Celonis.
If you have a direct cloud connection, the data will be pseudonimized within Celonis itself, but before it enters the data pool and thus is visible to end users (see General Overview (celonis.com)). However, it is possible that this does not comply with the security standards.
Hopefully this helps.
Kind regards,
Jan-peter
Hi @gary.pei,
If you use the Celonis SAP/JDBC Extractor that is installed on a server within the customer network, the data will be pseudonimized within the extractor and thus before it is loaded towards Celonis (see Attached image where the extractor is marked red). You can also use the extractor to extract data from a cloud application and then load it to Celonis.
If you have a direct cloud connection, the data will be pseudonimized within Celonis itself, but before it enters the data pool and thus is visible to end users (see General Overview (celonis.com)). However, it is possible that this does not comply with the security standards.
Hopefully this helps.
Kind regards,
Jan-peter
@1460067637 !
Hi @gary.pei,
Unfortunately, I'm not familiar with this structure. We wrote once a Python script that can pseudononymize data from one data pool to another, but not before entering Celonis (except from the methods I mentioned above). Hopefully somebody else here has a clue!
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.