Tokenization Portal

examine protection or unprotection of data when a protection data element is used.

After you set up a cluster between the ESA and multiple DSG nodes, the policies are deployed on respective DSG nodes. Each policy has related data elements, data stores, and roles. You can use the Tokenization Portal menu to examine protection or unprotection of data when a protection data element is used.

The Tokenization Portal provides an interface where you can select the data security operation you want to perform, along with the DSG node, data elements available in the policies deployed at that node, and an external IV value. Every protection operation performed through the Tokenization Portal is recorded as an event in Forensics.

To access the test utilities, in the browser, enter (https://ESA/DSG_IP_Address/TokenizationPortal).

Before you access the Tokenization Portal, ensure that the following pre-requisites are met:

  • Ensure that any user who wants to access the test utilities must be granted the Cloud Gateway User and Policy User permissions.
  • Ensure that the ESA where you are accessing Tokenization Portal is a part of the cluster.
  • Ensure that the policy on the ESA is deployed to all the DSG nodes in the cluster.
  • Ensure that the policy is synchronized across all the ESAs in the cluster.

The following image illustrates the UI options on the Tokenization Portal tab.

The following table provides the description for each of the available Tokenization tab options:

CalloutColumn/Textbox/ButtonSub-ColumnsDescriptionNotes
1Input Text Enter the data you want to protect or unprotect.
2Output Text Transformed data, either protected or unprotected based on operation selected.
3Output Encoding* Select the type of encoding you want to use. Though the Output Encoding option is part of the Input Text area, remember that encoding is applied to Input data during protection and reprotection, and output data during unprotection.
4Clear Clear the text in the Input Text or Output Text box.
5Unprotect/Protect/Reprotect Click to perform security operation on the Input Text. You can either Protect, Unprotect, or Reprotect Data.This option changes to Protect, Unprotect, or Reprotect based on the Action selected for data security operation.
6Clear Clear the text in the Input Text or Output Text box.
 Action Logs Logs related to the data protection or unprotection are displayed under this area. These logs are cached in the browser session and are not persisted in the system.
7 StatusDisplays if data security operation was successful.
8 DateTimeDate and time when the data security operation was performed.
9 External IVExternal IV value that was used for the data security operation.
10 Data ElementData element used.
11 DSG NodeThe DSG node where the data security operation was performed.
12 OutputTransformed data.
13 InputInput data.
14 ActionData security operation performed.
15New External IV New external IV value that will be used along with the protect or unprotect algorithm to create more secure encrypted data.This field applies to the Reprotect option only.
16New Data Element New data element that will be used to perform data security operation.This field applies to Rthe eprotect option only.
17External IV External IV value that will be used along with the protect or unprotect algorithm to create more secure encrypted data.
18Data Element Data element that will be used to perform data security operation.
19DSG Node The DSG node where the data security operation will be performed.
20Action Data security operation, Protect, Unprotect, or Reprotect that you want to perform.

* - The available encoding options are as follows:

  • Output Encoding: The field appears when action selected is either Protect or Reprotect.
  • Input Encoding: The field appears when action selected is Unprotect.
Last modified February 7, 2025