Skip to main content
Skyhigh Security

Tokenization Settings

Find the Tokenization Settings page at Settings > Infrastructure > Tokenization

You can detokenize and tokenize your users' identity by pointing to the tokenization file produced by the Skyhigh Cloud Connector Log Processor. If you have several Log Processors feeding data to the system, you will have to connect the system to each tokenization file from each instance of your Log Processors.

Use this page to see how many Skyhigh Cloud Connector instances are running and can respond to detokenization requests.

tokenization_settings.png

  • Was this article helpful?