Getting Started
  • Protecto Overview
    • Introduction
      • Quickstart Guide
      • Protecto Vault
        • What is a token?
        • Token customization
        • Authentication
        • Tokenization APIs
          • Masking
            • Mask with token
            • Mask with format and token
            • Identify and mask (Auto-detect)
          • Unmasking
          • What happens if an API fails?
        • Asynchronous API's
        • Bulk data
      • Add new data source
        • Snowflake
          • Create and grant access to Protecto
          • Add Snowflake to Protecto
        • Salesforce
          • Create connected app and user
            • Steps to create connected app
            • Steps to create Protecto user
          • Add Salesforce to Protecto
        • Azure SQL
          • Connect using AD Application credentials
          • Connect using database user credentials
        • Databricks
          • Add Service principal (Azure AD Application) to Databricks
          • Steps to create Azure Databricks Cluster
          • Steps to create Databricks python notebook and schedule job
        • Redshift
          • Create and grant access to Protecto user
          • Add Redshift to Protecto
      • Protecto FAQ's
        • 1. What are the steps after we sign up for a Protecto account?
        • 2. Can I sign up for a free account? How long is the trial period?
        • 3. What is Protecto license key? How can I get a new license key?
        • 4. How do I extend the trial period?
        • 5. What is the Protecto pricing model?
        • 6. How do I cancel my account?
        • 7. How do I unsubscribe / opt-out from emails?
      • Compliance User Guide
        • Risk Identification: Key Definitions
        • Understanding Risks
          • Find assets with severe breach risk
          • Filter assets by breach risk level
          • Find assets with other privacy risks
        • Understanding Usage
          • Find the data assets that were accessed
          • Find the data assets that are not used
        • Add Tags & Classification
          • Add tags globally
          • Classify tags to the categories
          • Add tags with category to the data assets
          • Remove tags with category from the data assets
        • Governance
          • Find all data assets
          • Add/delete purposes
          • Assign data owner for a data asset
          • Add/delete consent, data subject type and location for a data asset
          • Add/update retention time for a data asset
          • Add/update minor data for a data asset
        • Generate Compliance Reports
          • ROPA (Records of Processing Activities)
          • DPIA (Data Protection Impact Assessment)
Powered by GitBook
On this page
  1. Protecto Overview
  2. Introduction
  3. Protecto Vault
  4. Tokenization APIs
  5. Masking

Mask with token

PreviousMaskingNextMask with format and token

Last updated 1 year ago

With this approach, data is masked according to user-defined token types (e.g., Text token, Alphanumeric, Numeric Token, etc.).

Note: To send a request with the authentication token, include the following in headers:

Headers: {"Authorization": "Bearer <AUTH_TOKEN>"}

Endpoint:

https://trial.protecto.ai/api/vault/mask

Request Method: PUT

Request Payload:


{"mask": [{ "value": “George Williams","token_name": "Numeric Token"}]}

Parameters:

· value (string): Sensitive data value to be masked.

· token_name (string): Token to be used for masking the sensitive data.

Response:

{"data": [{"value": " George Williams “, "token_value”": “2333",” token_name": "Numeric Token “}]}

Response Parameters:

· token_value (string): Generated token replacing the sensitive data.

Advantage:

Token-based masking is a data protection technique that allows users to customize the masking of sensitive data according to their preferences.

  1. Token Type: Users can choose the type of tokens to be used for masking, such as text-based tokens, alphanumeric tokens, or a combination of both.

  2. Token Length: Users can define the desired length of the tokens. For example, tokens can be set to a specific number of characters or digits.

  3. Case Sensitivity: Users may opt for case-sensitive or case-insensitive masking.