Privara runs alongside your chatbot as a background process — it is never inline. Your LLM always receives the full original message for personalization. Privara asynchronously detects and protects PII from your Conversation DB after messages are written to it.
X-API-Key header on every request, format: sk_live_{client}_{32chars}) and a Fernet encryption key used to encrypt message blobs. Both are shown once only — copy them immediately.
safe_message blob in your Encrypted DB. Tokenization is included — no separate step needed.
[PREFIX_XXXXXXXX] where the 8-char hex is MD5(pii_type:value) — deterministic, deduplicated per client."safe_message": "fp:a1b2c3d4e5f6a7b8:gAAAAAB...", // fingerprint:hex16:ciphertext — store this
"original_length": 64,
"pii_found": [
{ "type": "person_ctx", "risk_level": "high", "confidence": "0.9" },
{ "type": "ssn", "risk_level": "critical", "confidence": "1.0" },
{ "type": "credit_card", "risk_level": "critical", "confidence": "1.0" }
],
"risk_score": 100.0,
"encryption_enabled": true
}
fp:<16hex>:<ciphertext> — the hex is SHA-256[:16] of the enc key used. /api/decrypt reads it for O(1) key lookup across all past rotation windows. You never manage old keys.
t = 0s
0 – 180s
423 on write
auto-issued
saved to history
- 1Upload your file — CSV, Excel (.xlsx), JSON, or TXT
- 2Select the column containing the
fp:…:…blobs - 3Enter your API key and your current encryption key
- 4Click "Decrypt All" — rows are decrypted in batches and a clean file downloads automatically
/api/protect and /api/decrypt call produces an audit log entry (timestamp, action, IP, status, PII types, risk score). Review in Usage and Logs — filter by action, status, or risk tier and export for compliance reporting.
Token format: [PREFIX_XXXXXXXX] where the 8-char hex suffix is MD5(pii_type:value). The same value always produces the same token within your client scope — deterministic and deduplicated.
critical
critical
critical
high
high
high
moderate
moderate
moderate
low
low
low
risk_score is 0.0–100.0, computed per NIST SP 800-122: additive base score by PII type × combination multiplier (highest applicable), normalized to 100.
Enforced per API key by middleware. Default limit is set at key creation (default: 60 req/min). Auth endpoints use a separate stricter limiter.
- ✓ Token → encrypted PII value mappings (PII Vault)
- ✓ SHA-256 fingerprints of enc keys (not the keys)
- ✓ Full enc key history for decrypt (server-internal)
- ✓ Audit log: timestamp, client, action, IP, status
- ✓ API key usage log: endpoint, timestamp, IP
- ✗ Plaintext PII values — always encrypted in vault
- ✗ Your raw Conversation DB contents
- ✗ Encrypted message blobs — returned to you, stored in your DB
- ✗ API keys in plaintext — bcrypt-hashed only
- ✗ Your users' unprotected messages
- ✗ Old enc keys as active auth credentials