Enterprise Security

Field-Level Data Masking

Protect sensitive data at the field level — emails, phone numbers, SSNs, and more are automatically masked so only authorized users see raw values. Everyone else sees obfuscated data by default.

Book a Call
Field-Level Data Masking
Enterprise
Viewing as:
Support Agent
Compliance Officer
Name
Email
Phone
SSN
J***n S***h
j****@****.com
***-***-4521
***-**-6789
M***a G*****z
m****@****.com
***-***-8834
***-**-1234
R****t J*****n
r****@****.com
***-***-2210
***-**-5678
4 fields masked • Server-side enforced • API responses protected
Role-based • Partial or full masking • Zero migration
Compliance Officer View
Unmasked
Viewing as:
Support Agent
Compliance Officer
Name
Email
Phone
SSN
John Smith
john@acme.com
415-555-4521
123-45-6789
Maria Gonzalez
maria@corp.com
212-555-8834
987-65-1234
Robert Johnson
rob@bank.com
305-555-2210
456-78-5678
Full access granted • All unmasked views are audit-logged
Authorized access • Audit trail • Role: compliance_officer

How It Works

Server-Side Enforcement

Masking happens on the backend, not just the UI. Data is never exposed in API responses to unauthorized users.

Flexible Masking Types

Full mask (*******) or partial (j***@****.com) with configurable visible characters for each field.

Granular Access Control

Define who sees raw data based on user role or any custom property. Compliance officers see everything, support agents see masked values.

Zero Migration

Works with your existing databases. No schema changes needed — configure masking rules and they apply instantly.

Audit-Logged Access

Every time an authorized user views unmasked data, it is logged. Full traceability for compliance and security reviews.

Masking Types

FieldOriginalMaskedType
Emailjohn@acme.comj***@****.comPartial
Phone415-555-4521***-***-4521Partial
SSN123-45-6789***-**-6789Partial
NameJohn SmithJ***n S***hPartial
Credit Card4532-1234-5678-9012*******Full
PasswordmyP@ssw0rd!*******Full

Real-World Use Case

A bank configures their customer table so that support agents see masked data — J***n S***h and j****@email.com — while only compliance officers with the admin role see the real values.

Support Agent
J***n S***h, j****@****.com, ***-**-6789
Masked
Manager
John S***h, john@****.com, ***-**-6789
Partial
Compliance Officer
John Smith, john@acme.com, 123-45-6789
Full

Available on Visionary ($250/mo), Build with You ($2,500/mo), Enterprise Plus, and Advanced plans.

Advanced Controls

Enterprise-grade masking controls

Per-user obfuscation permissions, impersonation safeguards, and builder-level masking -- ensuring sensitive data stays protected everywhere.

Per-user obfuscation permissions

Admins can now control, per user, whether a Creator or Compliance Officer is allowed to configure data masking rules. A simple toggle next to each user's role lets admins grant or revoke this permission -- ensuring only authorized team members can change what data is hidden or visible.

Data Obfuscation Permissions
Admin Panel
User
Role
Data Masking
SM
Sarah M.
Compliance
Can configure
JD
James D.
Creator
Can configure
AL
Ana L.
Creator
No access
MK
Mike K.
User
N/A
Admins control per-user access to data masking configuration
Per-user control • Toggle on/off • Instant effect

Impersonation always masks data

When an admin uses "View as User" to see the app from another user's perspective, all sensitive data is always masked -- regardless of that user's permissions. This ensures admins cannot use impersonation as a backdoor to view raw customer data, meeting PCI-DSS and SOC 2 compliance requirements.

Impersonation Mode
View as User
Viewing as: Support Agent (Lisa R.)
Admin: John A. • All data masked
EXIT
Name
Email
Phone
SSN
J***n S***h
j****@****.com
***-***-4521
***-**-6789
M***a G*****z
m****@****.com
***-***-8834
***-**-1234
Data always masked during impersonation
Admins cannot use “View as User” to bypass masking rules. Meets PCI-DSS and SOC 2 requirements.
PCI-DSS • SOC 2 • No backdoor access

Builder view respects masking

The database table view inside the app builder now respects the same masking rules configured for end users. Users without obfuscation permissions see masked data in the builder, closing a gap where raw data was previously visible during app configuration.

App Builder — Database View
Masking Active
UI
Logic
Database
Settings
customers324 rows
name
email
phone
ssn
J***n S***h
j****@****.com
***-***-4521
***-**-6789
M***a G*****z
m****@****.com
***-***-8834
***-**-1234
R****t J*****n
r****@****.com
***-***-2210
***-**-5678
Builder view respects masking rules • Same rules as end users
No raw data exposure • Role-consistent • Builder + end user parity

Protect sensitive data without changing your database.