A transformation configuration defines the rules to transform data for a given target. Encrypt, decrypt, anonymize, tokenize, and other transformations can be used within a configuration.
One target can have one or more configurations. A given configuration can be used for only one target.