QuantaSeal
QuantaSeal
Get up and running with QuantaSeal in 4 simple steps.
Sign up and get your API key from the dashboard
# Get your API key from https://dashboard.quantaseal.io
export QUANTASHIELD_API_KEY="your_api_key_here"
export QUANTASHIELD_ORG_ID="your_org_id"Install the QuantaSeal SDK for your language
# Python
pip install quantaseal
# Node.js
npm install @quantaseal/sdk
# Go
go get github.com/quantaseal/sdk-go
# Java
<dependency>
<groupId>io.quantaseal</groupId>
<artifactId>quantaseal-sdk</artifactId>
<version>1.0.0</version>
</dependency>Create a QuantaSeal client instance
# Python
from quantaseal import QuantaSeal
client = QuantaSeal(
api_key=os.getenv("QUANTASHIELD_API_KEY"),
org_id=os.getenv("QUANTASHIELD_ORG_ID")
)
# Node.js
import { QuantaSeal } from '@quantaseal/sdk';
const client = new QuantaSeal({
apiKey: process.env.QUANTASHIELD_API_KEY,
orgId: process.env.QUANTASHIELD_ORG_ID
});Encrypt sensitive data with quantum-safe algorithms
# Encrypt a string
encrypted = client.encrypt(
data="sensitive_user_data",
algorithm="KYBER_1024"
)
# Encrypt field in existing object
user = {
"name": "John Doe",
"ssn": "123-45-6789",
"email": "john@example.com"
}
# Encrypt SSN only
user["ssn"] = client.encrypt_field(
data=user["ssn"],
field_name="ssn"
)
# Decrypt when needed
decrypted = client.decrypt(encrypted)You're now encrypting data with NIST-approved post-quantum algorithms. Check your dashboard to monitor encryption activity.
Step-by-step guides to integrate QuantaSeal with your existing tools.
Encrypt Salesforce fields without code changes
Transparent database encryption with zero downtime
Document-level encryption for NoSQL databases
Secure payment data and PII tokenization
Encrypt objects before storing in S3
Proxy any REST API through QuantaSeal
Common use cases and code examples.
Encrypt specific fields in your database records
# Example: Encrypt user PII
client.encrypt_fields(
table="users",
fields=["ssn", "credit_card", "email"],
algorithm="KYBER_1024"
)
# Queries work transparently
user = db.query("SELECT * FROM users WHERE id = ?", user_id)
# SSN is automatically decrypted if user has permissionRoute API calls through QuantaSeal proxy
# Instead of calling Salesforce directly:
# response = requests.post("https://api.salesforce.com/...")
# Use QuantaSeal proxy:
response = requests.post(
"https://proxy.quantaseal.io/salesforce",
headers={
"X-QuantaSeal-API-Key": api_key,
"X-Target-Endpoint": "/services/data/v58.0/sobjects/Account"
},
json=account_data
)
# Sensitive fields are automatically encrypted!Rotate encryption keys without downtime
# Rotate keys for a specific table
client.rotate_keys(
table="users",
fields=["ssn", "credit_card"],
new_algorithm="KYBER_1024",
strategy="rolling" # blue/green or rolling
)
# Check rotation status
status = client.get_rotation_status(table="users")
print(f"Progress: {status['progress']}%")Generate compliance reports automatically
# Generate SOC 2 compliance report
report = client.compliance.generate_report(
framework="SOC2",
start_date="2024-01-01",
end_date="2024-12-31"
)
# Export to PDF
report.export_pdf("soc2_report_2024.pdf")
# Get audit trail
audit_trail = client.audit.get_events(
table="users",
action="decrypt",
start_date="2024-01-01"
)Manage your QuantaSeal resources from the command line.
# Install CLI
npm install -g @quantaseal/cli# Login
quantaseal login# List encryption keys
quantaseal keys list# Rotate keys
quantaseal keys rotate --table users --fields ssn,credit_card# Generate compliance report
quantaseal compliance report --framework SOC2 --year 2024Our support team is here to help you get started and answer any questions.