"Decrypt Data" node
The Decrypt Data node lets you decrypt values in selected columns of a dataset. Paired with the Encrypt data node or an external encryption tool, it enhances data security and confidentiality by encrypting sensitive information with AES-256 key using AES-GCM mode that is unreadable without a decryption key.
By using this transformation, you can safeguard your data and comply with privacy regulations while maintaining the integrity of your dataset.
Requirements
- You must have a user role with the following permission: Settings > Encryption keys > Read - To preview list of encryption keys, preview list of encryption keys in Encrypt Data and Decrypt Data nodes in Data Transformation;
- Create an encryption key in Synerise
Node configuration
-
Double-click the Decrypt Data node.
-
Click Add rule.
-
Select one of the Include options, by clicking the
icon next to these:
- these - the default; it lets you select the columns in which you want to decrypt data.
- all except these - this option lets you select the columns in which you do NOT want to decrypt data. Values from the other columns will be decrypted as defined in the further steps.
-
Select columns to include/exclude (according to the Include setting above) in one of the following ways:
-
Select column - from the dropdown list, you can select the columns to be included or excluded from the transformation.
-
Add condition - you can create a dynamic condition which columns must meet to decrypt their values; for this purpose, you can use logical operators such as contain, starts with, ends with, and so on.
Important: You can’t combine dynamic conditions with the Include all except these option.
For further instructions, select one of the tabs below, depending on the option you have chosen in step 4.
Select column option - From the dropdown list, select the first column whose values will be decrypted.
- To add more columns, click
icon.
- From the Decrypt data using dropdown list, select the key with which the data will be decrypted.
-
-
To add more rules, click Add rule and repeat steps from 3 to 5.
-
You can check the preview of the file after changes in the Output data tab.
-
Confirm the settings by clicking Apply.
Example of use
You can use the Decrypt Data node to decrypt a set of sensitive data you receive in Synerise. For example, you want to decrypt a column in a CSV file that contains email addresses of your customers. This example of use contains instructions how to create a transformation rule that decrypts a set of sensitive data. You can use the transformation rule from the Data Transformation node in a workflow that retrieves the file from an external source, decrypts email addresses, and imports them to Synerise.
Before you proceed to creating a transformation rule that uses this node, ensure that you meet the requirements.
email,newsletter agreement
HbXwKJulDVa9VblCWhraOHSKo61w5kZfMFwKkEF5zJOQ5DJar108bYyf8Jd7HZJT,yes
oIMNS9VUuwhirdXftfUPOKKmlzaAV21GofOqAb/yEYudwYzjYlOKdwmUf9aOl3CMHjc=,no
b1etJupv9xyhHhMlGoaHi1gAqEEioy/3igxYdXXLPJe1gZCUvc7aR0PUe6LS6t6+Yxfr,yes
y6THLdsxjxCLUTv1spFN4iwFTVhaaOL6c4fSadQ0+fgMDkiB86lP1Zpx+20QfNHSKQQ=,yes
sGV7bJiCL448OfAf/ZUPn8tKzsOyWIg06ukFcyGogOidx6pLt/s4sQ0VusAfV+HulEkjMIw=,no
- As the first node of the transformation rule, add Data Input.
- In the settings of the node, upload a file sample which imitates the structure of the source file (the one which will be received in a workflow which retrieves the actual file from your external source).
- Confirm the settings by clicking Apply.
- As the next node, add Decrypt Data.
- In the settings of the node, select the email column.
- From the Decrypt data using dropdown list, select the Synerise encryption key which will be used to decrypt data in this column.
Configuration of the Decrypt Data node - Confirm the settings by clicking Apply.
- In the Output data tab in the Decrypt Data node, you can preview the results of the transformation in the node.
Output of the transformation performed within the Decrypt Data node - Add the Output Data node.
In the further steps, you can create a workflow that is triggered repeatedly, retrieves a file with encrypted email addresses, decrypts email addresses by means of the transformation rule created as described above, and imports customers with these decrypted email addresses to Synerise.
