Tokenization Vault Overview

Note: Beginning with release 10.2, the Encryption policy no longer exists. You can encrypt blocks of unstructured data using keys.

The Tokenization vault lets you configure the following policy types:

  • Tokenization—Format-preserving encryption. For example:

    Tokenization can be reversed to retrieve the sensitive data from the token.

  • Masking—Masks data. You can set the masking character, plus a prefix and suffix value if you want to preserve some of the data. For example:

    Original credit card number: 2222-3333-4444-5555

    Masked credit card number: 22##-####-####-##55

    Masking is one-way encryption. You cannot retrieve the data from the token.

    An example use case is exporting data and generating reports with the sensitive data masked.

Note: The KeyControl Tokenization Vault webGUI has an automatic timeout value of 15 minutes.