Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The data strategy governs the process of validating the vendor data, creating, enriching, and validating the golden copy security, and releasing the golden copy security on a field by field basis to the SECURITY database in the Eagle data warehouse.

...

  1. Select a rule from the Source Rule drop-down list.
    You see the source hierarchy rules displayed in the space below.
  2. Click Next.
    You see the Enrichments page.

Define Vendor Data Expiration 

In the Vendor Data Expiration page 

Apply Enrichments

In the Enrichments page you can select pre-configured enrichments to be applied to the data strategy that you are creating.

...