Masking API (5.1.42)

Download OpenAPI specification:Download

Schema for the Continuous Compliance Engine API

algorithm

Get all algorithms

Securityapi_key
Request
query Parameters
mask_type
string

The data type of value this algorithm can mask.

Enum: "BIG_DECIMAL" "LOCAL_DATE_TIME" "STRING" "BYTE_BUFFER" "GENERIC_DATA_ROW"
page_number
integer <int64>
Default: 1

The page number for which to get algorithms. This will default to the first page if excluded

page_size
integer <int64>

The maximum number of objects to return. This will default to the DefaultApiPageSize setting if not provided

Responses
200

Success

400

Bad request

403

Forbidden access

get/algorithms
Response samples
application/json
{
  • "_pageInfo": {
    },
  • "responseList": [
    ]
}

Create algorithm

Securityapi_key
Request
Request Body schema: application/json
required

The algorithm to create

algorithmName
required
string <= 100 characters

Equivalent to the algorithm name saved by the user through the GUI. For out of the box algo, this represents algorithm code.

algorithmType
required
string
Default: "COMPONENT"

The type of algorithm

Enum: "BINARY_LOOKUP" "CLEANSING" "COMPONENT" "CUSTOM_ALGORITHM" "DATE" "LOOKUP" "MAPPING" "MINMAX" "MISC" "REDACTION" "SEGMENT" "TOKENIZATION"
description
string

The description of the algorithm

frameworkId
integer <int64>

The algorithm framework id

Array of objects (AlgorithmField)
algorithmExtension
object
Responses
201

Success

400

Bad request

403

Forbidden access

404

Not found

409

Conflict

post/algorithms
Request samples
application/json
{
  • "algorithmName": "SimpleMaskingAlgorithm",
  • "algorithmType": "COMPONENT",
  • "description": "This is a simple algorithm that serves as an example for the API. The frameworkId value may vary by engine.",
  • "pluginId": 7,
  • "frameworkId": 3,
  • "algorithmExtension": {
    }
}
Response samples
application/json
{
  • "asyncTaskId": 1,
  • "operation": "RULESET_REFRESH",
  • "reference": 13,
  • "status": "RUNNING",
  • "cancellable": false
}

Get algorithm by name

Securityapi_key
Request
path Parameters
algorithmName
required
string

The name of the algorithm to get

Responses
200

Success

400

Bad request

403

Forbidden access

404

Not found

get/algorithms/{algorithmName}
Response samples
application/json
{
  • "algorithmName": "SimpleMaskingAlgorithm",
  • "algorithmType": "COMPONENT",
  • "description": "This is a simple algorithm that serves as an example for the API. The frameworkId value may vary by engine.",
  • "pluginId": 7,
  • "frameworkId": 3,
  • "algorithmExtension": {
    }
}

Update algorithm by name

Securityapi_key
Request
path Parameters
algorithmName
required
string

The name of the algorithm to update

Request Body schema: application/json
required

The updated algorithm

algorithmName
required
string <= 100 characters

Equivalent to the algorithm name saved by the user through the GUI. For out of the box algo, this represents algorithm code.

algorithmType
required
string
Default: "COMPONENT"

The type of algorithm

Enum: "BINARY_LOOKUP" "CLEANSING" "COMPONENT" "CUSTOM_ALGORITHM" "DATE" "LOOKUP" "MAPPING" "MINMAX" "MISC" "REDACTION" "SEGMENT" "TOKENIZATION"
description
string

The description of the algorithm

frameworkId
integer <int64>

The algorithm framework id

Array of objects (AlgorithmField)
algorithmExtension
object
Responses
200

Success

400

Bad request

403

Forbidden access

404

Not found

put/algorithms/{algorithmName}
Request samples
application/json
{
  • "algorithmName": "SimpleMaskingAlgorithm",
  • "algorithmType": "COMPONENT",
  • "description": "This is a simple algorithm that serves as an example for the API. The frameworkId value may vary by engine.",
  • "pluginId": 7,
  • "frameworkId": 3,
  • "algorithmExtension": {
    }
}
Response samples
application/json
{
  • "asyncTaskId": 1,
  • "operation": "RULESET_REFRESH",
  • "reference": 13,
  • "status": "RUNNING",
  • "cancellable": false
}

Delete algorithm by name

Securityapi_key
Request
path Parameters
algorithmName
required
string

The name of the algorithm to delete

Responses
200

Success

400

Bad request

403

Forbidden access

404

Not found

delete/algorithms/{algorithmName}

Get a list of all algorithms that support migration to a new framework

Securityapi_key
Responses
200

Success

400

Bad request

401

Unauthorized access

404

Not found

get/algorithms/migration
Response samples
application/json
{
  • "availableMigrations": [
    ]
}

Create a migrated copy of an existing legacy algorithm

Securityapi_key
Request
path Parameters
algorithmName
required
string

The name of the algorithm to be migrated.

query Parameters
newAlgorithmName
required
string

The name of the new algorithm to be created by the migration process.

Responses
200

Success

400

Bad request

401

Unauthorized access

404

Not found

post/algorithms/{algorithmName}/migration
Response samples
application/json
{
  • "asyncTaskId": 1,
  • "operation": "RULESET_REFRESH",
  • "reference": 13,
  • "status": "RUNNING",
  • "cancellable": false
}

Randomize algorithm key by name

Securityapi_key
Request
path Parameters
algorithmName
required
string

The name of the algorithm who's key should be randomized

Responses
200

Success

400

Bad request

401

Unauthorized access

404

Not found

put/algorithms/{algorithmName}/randomize-key
Response samples
application/json
{
  • "algorithmName": "SimpleMaskingAlgorithm",
  • "algorithmType": "COMPONENT",
  • "description": "This is a simple algorithm that serves as an example for the API. The frameworkId value may vary by engine.",
  • "pluginId": 7,
  • "frameworkId": 3,
  • "algorithmExtension": {
    }
}

Generate a report listing all usage of an algorithm on the masking engine

Securityapi_key
Request
path Parameters
algorithmName
required
string

The name of the algorithm

query Parameters
includeAssignmentDetail
required
boolean
Default: false

Whether to include extended, human-readable algorithm assignment detail in the report. File and mainframe format usages are expanded to show each usage across environments, rulesets and files. The content and ordering of these details are subject to change.

excludeChainedAlgorithms
boolean
Default: false

Whether to exclude chained algorithm. This parameter will skip the computation of referencing algorithms

environmentFilter
Array of strings

Report only usage occurring within the specified environment(s). When the algorithm is used in a file format, all usage of that file format is reported so long as it is referenced by any environment matching the filter. Filtering by environment excludes all domain and algorithm reference usage.

rulesetFilter
Array of strings

Report only usage occurring within the specified ruleset(s). When the algorithm is used in a file format, all usage of that file format is reported so long as it is referenced by any ruleset matching the filter. Filtering by ruleset excludes all domain and algorithm reference usage.

Responses
200

Success

400

Bad request

401

Unauthorized access

404

Not found

get/algorithms/{algorithmName}/usage
Response samples
application/json
{
  • "algorithmName": "string",
  • "algorithmMaskingType": "BIG_DECIMAL",
  • "columnMetadataIds": [
    ],
  • "fileFieldMetadataIds": [
    ],
  • "mainframeDatasetFieldMetadataIds": [
    ],
  • "environmentIds": [
    ],
  • "rulesetIds": [
    ],
  • "domainNames": [
    ],
  • "algorithmReferences": [
    ],
  • "assignmentDetails": [
    ]
}

Update ALL usage on the engine of the chosen algorithm to the replacement algorithm

Securityapi_key
Request
path Parameters
algorithmName
required
string

The name of the algorithm

query Parameters
replacementAlgorithmName
required
string

The name of the replacement algorithm

ignoreIncompatibleTypes
required
boolean
Default: false

Update usage even when the original and new algorithms have incompatible masking types.

environmentFilter
Array of strings

Only update usage occurring within the specified environment(s). When an environment filter is applied, domain and algorithm reference usage is not updated. This operation will fail if any file format referencing the algorithm is used from environments that don't match the filter.

rulesetFilter
Array of strings

Only update usage occurring within the specified ruleset(s). When a ruleset filter is applied, domain and algorithm reference usage is not updated. This operation will fail if any file format referencing the algorithm is used from rulesets that don't match the filter.

Responses
200

Success

400

Bad request

401

Unauthorized access

404

Not found

put/algorithms/{algorithmName}/usage
Response samples
application/json
{
  • "algorithmName": "string",
  • "algorithmMaskingType": "BIG_DECIMAL",
  • "columnMetadataIds": [
    ],
  • "fileFieldMetadataIds": [
    ],
  • "mainframeDatasetFieldMetadataIds": [
    ],
  • "environmentIds": [
    ],
  • "rulesetIds": [
    ],
  • "domainNames": [
    ],
  • "algorithmReferences": [
    ],
  • "assignmentDetails": [
    ]
}

Export lookup values for secure lookup algorithm

Securityapi_key
Request
path Parameters
algorithmName
required
string

The name of the algorithm

Responses
200

Success

400

Bad request

401

Unauthorized access

404

Not found

post/algorithms/{algorithmName}/export-lookup-values
Response samples
application/json
{
  • "asyncTaskId": 1,
  • "operation": "RULESET_REFRESH",
  • "reference": 13,
  • "status": "RUNNING",
  • "cancellable": false
}

Validate algorithm

Securityapi_key
Request
Request Body schema: application/json
required

The algorithm to validate

algorithmName
required
string <= 100 characters

Equivalent to the algorithm name saved by the user through the GUI. For out of the box algo, this represents algorithm code.

algorithmType
required
string
Default: "COMPONENT"

The type of algorithm

Enum: "BINARY_LOOKUP" "CLEANSING" "COMPONENT" "CUSTOM_ALGORITHM" "DATE" "LOOKUP" "MAPPING" "MINMAX" "MISC" "REDACTION" "SEGMENT" "TOKENIZATION"
description
string

The description of the algorithm

frameworkId
integer <int64>

The algorithm framework id

Array of objects (AlgorithmField)
algorithmExtension
object
Responses
200

Success

400

Bad request

401

Unauthorized access

404

Not found

post/algorithms/validate
Request samples
application/json
{
  • "algorithmName": "SimpleMaskingAlgorithm",
  • "algorithmType": "COMPONENT",
  • "description": "This is a simple algorithm that serves as an example for the API. The frameworkId value may vary by engine.",
  • "pluginId": 7,
  • "frameworkId": 3,
  • "algorithmExtension": {
    }
}
Response samples
application/json
{
  • "validationSucceeded": true,
  • "message": "Algorithm validation successful"
}

Get all algorithm frameworks

Securityapi_key
Request
query Parameters
mask_type
string

Return only frameworks that mask the specified data type.

Enum: "BIG_DECIMAL" "LOCAL_DATE_TIME" "STRING" "BYTE_BUFFER" "GENERIC_DATA_ROW"
include_schema
boolean
Default: false

Whether to include each algorithm framework's JSON schema in the response.

page_number
integer <int64>
Default: 1

The page number for which to get algorithm frameworks. This will default to the first page if excluded

page_size
integer <int64>

The maximum number of objects to return. This will default to the DefaultApiPageSize setting if not provided

Responses
200

Success

400

Bad request

403

Forbidden access

get/algorithm/frameworks/
Response samples
application/json
{
  • "_pageInfo": {
    },
  • "responseList": [
    ]
}

Get algorithm framework by frameworkId

Securityapi_key
Request
path Parameters
frameworkId
required
integer <int64>

The id of the framework

query Parameters
include_schema
boolean
Default: false

Whether to include each algorithm framework's JSON schema in the response.

Responses
200

Success

400

Bad request

403

Forbidden access

get/algorithm/frameworks/id/{frameworkId}
Response samples
application/json
{
  • "frameworkId": 1,
  • "frameworkName": "MinMax",
  • "frameworkType": "STRING",
  • "plugin": {
    }
}