Using Fortanix Data Security Manager to Create Tokenization Secret


This document describes the steps to create a tokenization secret in Fortanix DSM.

Steps to Create a Tokenization Secret

  1. Click the Fortanix DSM Groups tab, and create a new group called Tokenization (if the group does not exist).  CreateGroup.png
    Figure 1: Create New Group for Tokenization App CreateGroup1.png
    Figure 2: Create a Group
  2. Once the group is created, configure any of the policies for the group that are required by your organization, such as the Quorum approval policy, Key undo policy (for sensitive key operations), Cryptographic policy, and Key custodian policy.  ConfigureDSMPolicy.png
    Figure 3: Configure DSM Policy
  3. Add a new “Tokenization App” to the Group.
      1. Give it a name and select the API Interface (in the following example, the Rest API is used).
      2. Select the Authentication Mechanism to be used by the application (in the example below the API Key is used).CreateTokenizationApp.png
        Figure 4: Create a Tokenization APP CreateTokenizationApp1.png
        Figure 5: Select API Interface and Authentication Mechanism
  4. Create a Tokenization Secret in the same group created in Step 1.CreateTokenizationSecret.png
    Figure 6: Create Tokenization Secret in the Same Group CreateTokenizationSecret1.png
    Figure 7: Create a Tokenization Secret


In the Add New Security Object form

  1. Select GENERATE to generate a tokenization secret.
  2. In the Choose a type section, select the key type as “Tokenization”.GenerateTokenizationObject.png
    Figure 8: Generate a Tokenization Object
  3. Select the Data type to be tokenized.
    • Email Address EmailTokenization.png
      Figure 9: Tokenize Email Address
    • Numbers CustomTokenization.png
      Figure 10: Tokenize Custom Numbers
    • Alphanumeric AlphanumericTokenization.png
      Figure 11: Tokenize Alphanumeric Characters
  4.  Enter the key size and select the key operations.
  5. Click GENERATE to generate the key.GenerateKey.png
    Figure 12: Key Size and Key Operations
  6. You now have the Unique Identifier (UUID) of the Secret to be used by the Application to reference the Tokenization Secret and perform the tokenization operations.KeyUUID.png
    Figure 13: Key UUID to Perform Tokenization Operations 















Please sign in to leave a comment.

Was this article helpful?
0 out of 0 found this helpful