The data strategy governs the process of validating the vendor data, creating, enriching, and validating the golden copy security, and releasing the golden copy security on a field by field basis to the SECURITY database in the Eagle data warehouse.
...
- Select a rule from the Source Rule drop-down list.
You see the source hierarchy rules displayed in the space below. - Click Next.
You see the Enrichments page.
Define Vendor Data Expiration
In the Vendor Data Expiration page
Apply Enrichments
In the Enrichments page you can select pre-configured enrichments to be applied to the data strategy that you are creating.
...