What is the difference between the Log Obfuscation and Data Obfuscation interceptors?
Both Log Obfuscation and Data Obfuscation are used to hide data by replacing the selected information with predefined symbols.
Log Obfuscation Interceptor
-
The Log interceptor generates logs for viewing requests and responses.
-
The Log Obfuscation interceptor is used to hide selected data (present in the header or body of a request or response) in these logs.
Data Obfuscation Interceptor
It is a security interceptor that hides data present in the header, query param or body of requests and responses.
The data is only replaced by other characters. If you want the data to be encrypted instead of obfuscated, use the Log interceptor and select an encryption option. |
By accessing the General Trace screen, in the DATA OBFUSCATION tab, you can configure this interceptor.
For details on how to do this, refer to the Data Obfuscation interceptor configuration documentation.
The configuration will only affect existing calls.
To obfuscate data in future calls, configure the Log Obfuscation interceptor.
The logs can be found in General Trace and on the API Trace screen, which only displays requests made to the selected API.
Share your suggestions with us!
Click here and then [+ Submit idea]