Main Configuration Areas
Mode
Choose whether the workflow is reversible:pseudonymizefor encrypted mappings and later rehydrationanonymizefor irreversible protection
Detection
Control which detectors are active:- Built-in regex recognizers
- Optional NER model
- Custom recognizers and custom ID patterns
Policy
Policies shape detection behavior for each call or as a default:- Enabled regex and NER types
- Confidence thresholds
- Type priority for overlaps
- Allowlists and denylists
- ID reuse behavior
- Leak scanning and semantic masking
- Location scope exclusions (skip countries/regions)
Tag Format
By default, PII placeholders use XML-style tags:<PII type="EMAIL" id="1"/>. You can customize the delimiters and keyword:
tagFormat.open/tagFormat.close— delimiter characters (e.g.,[[/]])tagFormat.keyword— the keyword inside tags (default:PII)
Runtime Integrations
Configuration also covers runtime behavior such as:- Key providers for reversible workflows
- Storage providers for sessions
- NER model backend and download settings
- Semantic enrichment options
Example
Configuration Levels
Rehydra settings typically live at two levels:createAnonymizer()configuration for reusable defaults- Per-call policy overrides when a specific operation needs different rules
Keep Concepts Separate
It helps to think about configuration in layers:- Mode decides reversibility
- Recognizers decide what can be found
- Policy decides what should be found right now
- Tag format decides how placeholders look in output
- Key and storage settings decide how reversible data is managed
Next Steps
createAnonymizer
Review the full SDK configuration surface.
Recognizers
Understand the detection layer you are configuring.