Building the Protegrity Anonymization Request

Use the APIs provided with Protegrity Anonymization to create your request.
  • To use the APIs, you need to specify the source (file or data) that must be transformed. The source can be a single row of data or multiple rows of data sent in the request, or it could be a file located on the Cloud storage.
  • Next, you need to specify the transformation that must be performed on the various columns in the table.
  • Finally, after the transformation is complete, you can save the output or use it for further processing.

The transformation request can be saved for processing further requests. It can also be used as an input in machine learning.


Common Configurations for Building the Request

Use the information provided in this section to build the REST APIs and Python SDK request for performing the Protegrity Anonymization transformation.

Building the Request using the REST API

Use the information provided in this section to build the REST API request for performing the Protegrity Anonymization transformation.

Building the request using the Python SDK

Use the information provided in this section to build the request using the Python SDK environment for performing the Protegrity Anonymization transformation.


Last modified : March 24, 2026