Privicore
  1. Data Token
Privicore
  • Privicore API
  • Utility
    • Utility
    • Check server health
      GET
    • Request command id status
      GET
  • Profile
    • Profile Model and Authentication Workflow
    • Register new profile
      POST
    • Authenticate
      POST
    • Retrieve profile id
      GET
    • Change password
      POST
    • Generate qr token for authorization
      POST
    • Reauthorize authorization token
      POST
    • Revoke authorization token
      POST
    • Retrieve token expiry
      POST
  • OAuth Application
    • OAuth Application Management
    • Register OAuth Application
      POST
    • Retrieve OAuth app configuration
      POST
    • Request OAuth app authorization code
      GET
    • Retrieve OAuth app authorization code
      POST
    • Obtain OAuth app access token
      POST
    • OAuth application list
      GET
    • Retrieve OAuth application scope
      GET
    • Refresh OAuth app access token
      POST
  • Public key
    • Public and Private Key Management
    • Generate your private and public keys
    • Register public key
    • Retrieve public key
    • Retrieve CAB public key
  • Data Token
    • Data Token Management
    • Reserve token space
      POST
    • Retrieve temporary data token
      GET
    • Exchange data for token
      POST
    • Upstream file via stream auth
      POST
    • Request data via token
      POST
    • Download data
      GET
    • Configure information security risk meta
      POST
    • Configure file meta
      POST
    • List data tokens
      GET
    • Update data token
      POST
    • Delete data
      POST
  • Device
    • Device Management
    • Request unique identifier (i.e. Register new device)
    • Retrieve unique identifier
    • Retrieve profile devices
    • Configure device meta
    • Approve device
    • Reject device
    • Retrieve device configuration
    • Remove device
  • Storage
    • Storage Device Management
    • Register storage device
    • List storage devices
    • Synchronize device
    • Remove storage
  • Verified authenticator
    • Authenticator and Voting Management
    • Register authenticator
    • List verified authenticators
    • Retrieve voting strategy
    • Set quorum size
    • Set quorum strategy
    • Set voting time limit
    • Set maximum voting attempts
    • Remove authenticator
    • Register voting configuration
    • Update voting configuration
    • List voting configurations
    • Retrieve voting configuration
  • Policy
    • List policy templates
    • Register policy
    • List active policies
    • List inactive policies
    • Activate policy
    • Deactivate policy
    • Delete policy
    • List registered policies
    • Retrieve registered policy
  • Directory
    • Register Directory
    • Retrieve owned Directories
    • Retrieve assigned directories
    • Retrieve Directory
    • Create Directory User
    • Update user information
    • Invite Profile
    • Set profile password
    • List Directory Invites
    • Process Invitation
    • Retrieve directory profile
    • List directory users
    • Directory profiles info
    • Create profile device
    • Add storage device to profile
    • List directory devices
    • Create directory voting pool
    • Store directory meta information
  • Voting
    • Create voting
    • Check pool status
  • Schemas
    • Response
      • CommandAccepted
      • Unauthorized
      • ValidationErrors
    • Schemas
    • profileId
    • deviceIdentifier
    • directoryId
    • directoryName
    • directoryShortName
    • givenName
    • familyName
    • createdAt
    • meta
  1. Data Token

Configure information security risk meta

POST
/data-token/configure-information-security-risk-meta

Overview#

Configure security classification metadata for a data token. This metadata is used for security risk management, access control decisions, and integration with other features like voting systems.

Configure Information Security Risk Meta#

Endpoint: POST /data-token/configure-information-security-risk-meta
Authentication: Required (Authorization token obtained from the step)
Content-Type: application/x-www-form-urlencoded

Request Parameters#

ParameterTypeRequiredDescription
tokenstringYesThe data token identifier to configure
classificationstringYesSecurity classification level (e.g., top-secret, confidential, internal)
labelstringYesSecurity label or category for the data
handlingstringYesHandling instructions or requirements for the data

Use Case#

Use this endpoint to assign security risk metadata to data tokens after exchange. This metadata:
Defines security classification levels for compliance and policy enforcement
Provides handling instructions for data access and distribution
Integrates with other system features that require security context (e.g., voting, approval workflows)
Enables filtering and querying tokens by security attributes
Security metadata does not affect encryption or storage but provides organizational and policy-level context for data management.
Security metadata can be configured at any time after token exchange
Classification levels should align with your organization's security policies
Metadata is used by other features for access control and workflow decisions
Update metadata when security requirements change

Request

Authorization
API Key
Add parameter in header
X-DPT-AUTHORIZATION
Example:
X-DPT-AUTHORIZATION: ********************
or
Header Params

Body Params application/x-www-form-urlencoded

Request Code Samples

Shell
JavaScript
Java
Swift
Go
PHP
Python
HTTP
C
C#
Objective-C
Ruby
OCaml
Dart
R
Request Request Example
Shell
JavaScript
Java
Swift
curl --location --request POST 'https://sandbox.privicore.com:9009/data-token/configure-information-security-risk-meta' \
--header 'X-DPT-AUTHORIZATION: <api-key>' \
--data-urlencode 'token=' \
--data-urlencode 'classification=' \
--data-urlencode 'label=' \
--data-urlencode 'handling='

Responses

🟢202Success
This response does not have a body.
🟠401401
🟠422422
Modified at 2025-12-22 12:28:33
Previous
Download data
Next
Configure file meta
Built with