This is an automated email from the ASF dual-hosted git repository.

adelapena pushed a commit to branch cassandra-5.0
in repository https://gitbox.apache.org/repos/asf/cassandra.git


The following commit(s) were added to refs/heads/cassandra-5.0 by this push:
     new 410018ab16 Fix spelling errors in the documentation for DDM
410018ab16 is described below

commit 410018ab165b54c378648d52fb4ec815c557e80e
Author: Andrés de la Peña <[email protected]>
AuthorDate: Wed Aug 23 10:54:11 2023 +0100

    Fix spelling errors in the documentation for DDM
    
    patch by Andrés de la Peña; reviewed by Brandon Williams for CASSANDRA-18790
    
    Co-authored-by: Andrés de la Peña <[email protected]>
    Co-authored-by: Lorina Poland <[email protected]>
---
 .../pages/developing/cql/dynamic_data_masking.adoc    | 19 ++++++++++---------
 doc/modules/cassandra/partials/masking_functions.adoc |  2 +-
 2 files changed, 11 insertions(+), 10 deletions(-)

diff --git 
a/doc/modules/cassandra/pages/developing/cql/dynamic_data_masking.adoc 
b/doc/modules/cassandra/pages/developing/cql/dynamic_data_masking.adoc
index 8f523ac2ed..16599c9053 100644
--- a/doc/modules/cassandra/pages/developing/cql/dynamic_data_masking.adoc
+++ b/doc/modules/cassandra/pages/developing/cql/dynamic_data_masking.adoc
@@ -1,7 +1,7 @@
 = Dynamic Data Masking
 
 Dynamic data masking (DDM) allows to obscure sensitive information while still 
allowing access to the masked columns.
-DDM doesn't change the stored data. Instead, it just presents the data on 
their obscured form during `SELECT` queries.
+DDM doesn't change the stored data. Instead, it just presents the data in its 
obscured form during `SELECT` queries.
 This aims to provide some degree of protection against accidental data 
exposure. However, it's important to know that
 anyone with direct access to the sstable files will be able to read the clear 
data.
 
@@ -20,10 +20,10 @@ include::example$CQL/select_with_mask_functions.cql[]
 
 == Attaching masking functions to table columns
 
-The masking functions can be permanently attached to the columns of a table.
-In that case, `SELECT` queries will always return the column values in their 
masked form.
-The masking will be transparent for the users running `SELECT` queries,
-so their only way to know that a column is masked will be consulting the table 
definition.
+The masking functions can be permanently attached to any column of a table.
+If a masking columns is defined, `SELECT` queries will always return the 
column values in their masked form.
+The masking will be transparent to the users running `SELECT` queries,
+so their only way to know that a column is masked will be to consult the table 
definition.
 
 This is an optional feature that should be enabled with the 
`dynamic_data_masking_enabled` property in `cassandra.yaml`,
 since it's disabled by default.
@@ -74,8 +74,9 @@ include::example$CQL/ddm_drop_mask.cql[]
 == Permissions
 
 The `UNMASK` permission allows users to retrieve the unmasked values of masked 
columns.
-The masks will only be applied to the results of a `SELECT` query if the user 
doesn't have the `UNMASK` permission.
-Ordinary users are created without the `UNMASK` permission, whereas superusers 
do have it.
+Ordinary users are created without the `UNMASK` permission and will see masked 
values.
+Superusers are created with the `UNMASK` permission,
+and will be able to see the unmasked values in a SELECT query results.
 
 As an example, suppose that we have a table with masked columns:
 
@@ -104,7 +105,7 @@ the users:
 include::example$CQL/ddm_create_users.cql[]
 ----
 
-We can now see that the user with the `UNMASK` permission can see the clear 
data, without any masking:
+We can now see that the user with the `UNMASK` permission can see the clear 
data, unmasked:
 
 [source,cql]
 ----
@@ -130,7 +131,7 @@ Since it includes the `UNMASK` permission, that anonymous 
user will always see t
 In other words, attaching data masking functions to columns only makes sense 
if authentication is enabled.
 
 Users without the `UNMASK` permission are not allowed to use masked columns in 
the `WHERE` clause of a `SELECT` query.
-This prevents malicious users from figuring out the clear data by running 
exhaustive queries. For instance:
+This prevents malicious users from figuring out the clear data by running 
exhaustive queries. For example:
 
 [source,cql]
 ----
diff --git a/doc/modules/cassandra/partials/masking_functions.adoc 
b/doc/modules/cassandra/partials/masking_functions.adoc
index afadcd001e..43fb25c38d 100644
--- a/doc/modules/cassandra/partials/masking_functions.adoc
+++ b/doc/modules/cassandra/partials/masking_functions.adoc
@@ -2,7 +2,7 @@
 |===
 |Function | Description
 
-| `mask_null(value)` | Replaces the first argument by a `null` column. The 
returned value is always an absent column, as it didn't exist, and not a 
not-null column representing a `null` value.
+| `mask_null(value)` | Replaces the first argument with a `null` column. The 
returned value is always a non-existent column, and not a not-null column 
representing a `null` value.
 
 Examples:
 


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to