What is identifier hashing?
Acoustic Exchange supports standard hashing algorithms as a way to protect the privacy of personally identifiable information.
Acoustic Exchange supports standard hashing algorithms as a way to protect the privacy of personally identifiable information. During endpoint registration, a publisher endpoint can specify that it sends hashed identifiers or other attributes. It must specify the particular hashing algorithm that it applies to identity data that it sends to Acoustic Exchange. Destination endpoints must specify the hashing algorithms that it supports for data that it receives from Acoustic Exchange.
Acoustic Exchange can accept identity data that is already hashed by a source endpoint. Acoustic Exchange passes the hashed data to destination endpoints. When you define a syndication between endpoints that exchange hashed identifiers, you must ensure that the two endpoints support the same hashing algorithm.
Acoustic Exchange can also hash identifiers that are not hashed by a source endpoint. The destination endpoint must specify the hashing algorithm that it requires. Specify the required hashing algorithm on the Identifiers tab in the endpoint details for the publishing endpoint.
Acoustic Exchange supports the following hashing algorithms:
- MD5
- SHA1
- SHA256
- EMAIL_SHA256
- PHONE_SHA256
Consider your choice of hashing algorithm carefully to ensure that it will meet your requirements.