It is the complete software package that is needed to implement Aadhaar Data Vault within your organization.


UIDAI has mandated the use of tokenization – replacing sensitive data with a token that can be securely stored, processed and transmitted.
Aadhaar vault solution that will help AUAs/KUAs/Sub-AUAs/ or any other agency for specific purposes under Aadhaar Act to easily implement an encrypted Aadhaar Data Vault to securely store Aadhaar number and eKYC data. JISA’s exposes REST API to store Aadhaar Number and associated eKYC Data.

JISA's Aadhaar Data Vault

JISA’s Aadhaar Data Vault solution is the complete software package that is needed to implement Aadhaar Data Vault within your organization. The software exposes REST APIs that can be used to easily integrate with existing software services. The package supports database encryption for data protection with HSM integration.

  • Allow applications to tokenise and replace sensitive data with token values
  • Encrypts the Aadhaar number and connected data in a Secure Vault
  • Keys for encryption are stored in HSM
  • Flexible policies allow tokens to preserve the format of the input data
  • Application integration using either a SOAP or RESTfulwebservice
  • Allows System users to create policies, set client access and allowed operations, view audit data and configure other parts of the system
  • All operations can be single or bulk requests
  • Full auditing of all user access and client application operations
  • Unauthorized Access  alerts


Secure REST APIs
JISA’s Aadhaar Data Vault exposes simple and secure REST API that enables easy integration of Aadhaar Data Vault with the existing applications
Secure And Encrypted Solution
JISA’s Aadhaar Data Vault supports database encryption to ensure data security even if the database as a whole is compromised.
Access Logs
JISA’s Aadhaar Data Vault logs all API access activities. The log can be viewed via web user interface that supports search functionality as well.
JISA’s Aadhaar Data Vault Authenticates each transaction and alerts unauthorized Transaction.
UUID Based Reference Keys
Reference keys to map Aadhaar number are generated using UUID  scheme in order to ensure that the recovery of the original Aadhaar number from the reference key is computationally infeasible.
HSM Integration
JISA’s Aadhaar Data Vault provides integration with leading HSM models to enable encryption using HSM as mandated by UIDAI.
Administration Console
JISA’s Aadhaar Data Vault comes with an administration console with role-based user access to allow viewing of Aadhaar number reference key mapping and access logs.