Data Hashing
This component allows you to mask sensitive data on the fly by applying a hashing operation on a field. One of the advantages of hashing (as compared to masking) is that while the values cannot be reversed-engineered, two identical values will have the same hash value. The following Hash algorythms are available:
- MD5
- SHA1
- SHA256
- SHA384
- SHA512
Example
In this example, the MD5 operation is applied on the first field.