A transformation configuration defines the rules to
transform data for a
Encrypt, decrypt, anonymize, tokenize, and other transformations
can be used within
One target can have one or more configurations.
A given configuration can be
used for only one target.
You must belong to the Configuration user group to create and modify configurations