Aadhaar Data Vault
UIDAI has mandated the use of tokenization – replacing sensitive data with a token that can be securely stored, processed and transmitted.
Aadhaar vault solution that will help AUAs/KUAs/Sub-AUAs/ or any other agency for specific purposes under Aadhaar Act to easily implement an encrypted Aadhaar Data Vault to securely store Aadhaar number and eKYC data. SigningAPI’sexposes REST API to store Aadhaar Number and associated eKYC Data.
Aadhar Data Vault
As specified in the UIDAI Circular No. K-11020/205/2017, Aadhaar Data Vault is a secure encrypted centralized storage for all the Aadhaar numbers and related data collected by the AUAs/KUAs/Sub-AUAs/ or any other agency for specific purposes under Aadhaar Act and Regulations, 2016. It should be inside the respective agency’s infrastructure accessible only on a need to know basis. The Aadhaar data vault should provide a reference key, which is a unique token to represent the Aadhaar number in the entire internal ecosystem of the agency. The mapping of reference key and Aadhaar number should only be maintained in the Aadhaar Data Vault.
All business use-cases of entities shall use this Reference Key instead of Aadhaar number in all systems where such reference key need to be stored/mapped, i.e. all tables/systems requiring storage of Aadhaar numbers for their business transactions should from now onwards maintain only the reference key. Actual Aadhaar number should not be stored in any business databases other than Aadhaar Data Vault.
JISA’s Aadhaar Data Vault
JISA’s Aadhaar Data Vault solution is the complete software package that is needed to implement Aadhaar Data Vault within your organization. The software exposes REST APIs that can be used to easily integrate with existing software services. The package supports database encryption for data protection with HSM integration.
- Allow applications to tokenise and replace sensitive data with token values
- Encrypts the Aadhaar number and connected data in a Secure Vault
- Keys for encryption are stored in HSM
- Flexible policies allow tokens to preserve the format of the input data
- Application integration using either a SOAP or RESTfulwebservice
- Allows System users to create policies, set client access and allowed operations, view audit data and configure other parts of the system
- All operations can be single or bulk requests
- Full auditing of all user access and client application operations
- Unauthorised Access alerts