Skip to main content

ITP API Documentation

Welcome to the comprehensive documentation for our ITP API. This guide will help you understand how to integrate and utilize our powerful ITP services in your applications.

Overview

Our ITP API provides secure methods to convert sensitive data into non-sensitive tokens while maintaining the ability to retrieve the original data when necessary. This approach significantly reduces the risk of data breaches while enabling you to maintain functionality in your applications.

Key Features

  • Data Tokenization: Convert sensitive information into secure tokens
  • Token Management: Create, retrieve, update, and delete tokens
  • Batch Processing: Tokenize multiple data elements in a single request
  • Flexible Token Formats: Configure token formats to match your requirements
  • Secure Detokenization: Retrieve original data with proper authentication
  • Comprehensive Audit Logging: Track all tokenization and detokenization activities

Authentication

All API requests require authentication using API keys. To obtain an API key:

  1. Register for an account on our developer portal
  2. Navigate to the API Keys section
  3. Generate a new API key
  4. Include this key in the Authorization header of all requests
Authorization: Bearer YOUR_API_KEY

Headers

Required Headers

  • Authorization: Bearer token for authentication
  • X-Target-Server: Specifies the target server for the request. This header is required for specific endpoints and should be set according to the endpoint documentation.