LogoLogo
Go to Syntho.AI
English
English
  • Welcome to Syntho
  • Overview
    • Get started
      • Syntho bootcamp
        • 1. What is Syntho?
        • 2. Introduction data anonymization
        • 3. Connectors & workspace creation
        • 4. PII scan
        • 5. Generators
          • Mockers
          • Maskers
          • AI synthesize
          • Calculated columns
          • Free text de-identification
        • 6. Referential integrity & foreign keys
        • 7. Workspace synchronization & validation
        • 8. Workspace & user management
        • 9. Large workloads​
        • 10. AI synthesis: Data pre-processing when using
      • Prerequisites
      • Sample datasets
      • Introduction to data generators
      • AI-generated synthetic data
    • Frequently asked questions
  • Setup Workspaces
    • View workspaces
    • Create a workspace
      • Connect to a database
        • PostgreSQL
        • MySQL / MariaDB
        • Oracle
        • Microsoft SQL Server
        • DB2
        • Databricks
          • Importing Data into Databricks
        • Hive
        • SAP Sybase
        • Azure Data Lake Storage (ADLS)
        • Amazon Simple Storage Service (S3)
      • Workspace modes
    • Edit a workspace
    • Duplicate a workspace
    • Transfer workspace ownership
    • Share a workspace
    • Delete a workspace
    • Workspace default settings
  • Configure a Data Generation Job
    • Configure table settings
    • Configure column settings
      • AI synthesize
        • Sequence model
          • Prepare your sequence data
        • QA report
        • Additional privacy controls
        • Cross-table relationships limitations
      • Mock
        • Text
          • Supported languages
        • Numeric (integer)
        • Numeric (decimal)
        • Datetime
        • Other
      • Mask
        • Text
        • Numeric (integer)
        • Numeric (decimal)
        • Datetime
        • UUID
      • Duplicate
      • Exclude
      • Consistent mapping
      • Calculated columns
      • Key generators
        • Differences between key generators
      • JSON de-identification
    • Manage personally identifiable information (PII)
      • Privacy dashboard
      • Discover and de-identify PII columns
        • Identify PII columns manually
        • Automatic PII discovery with PII scanner
      • Remove columns from PII list
      • Automatic PII discovery and de-identification in free text columns
      • Supported PII & PHI entities
    • Manage foreign keys
      • Foreign key inheritance
      • Add virtual foreign keys
        • Add virtual foreign keys
        • Use foreign key scanner
        • Import foreign keys via JSON
        • Export foreign keys via JSON
      • Delete foreign keys
    • Validate and synchronize workspace
    • View and adjust generation settings
  • Deploy Syntho
    • Introduction
      • Syntho architecture
      • Requirements
        • Requirements for Docker deployments
        • Requirements for Kubernetes deployments
      • Access Docker images
        • Online
        • Offline
    • Deploy Syntho using Docker
      • Preparations
      • Deploy using Docker Compose
      • Run the application
      • Manually saving logs
      • Updating the application
      • Backup
    • Deploy Syntho using Kubernetes
      • Preparations
      • Deploy Ray using Helm
        • Upgrading Ray CRDs
        • Troubleshooting
      • Deploy Syntho using Helm
      • Validate the deployment
      • Troubleshooting
      • Saving logs
      • Upgrading the applications
      • Backup
    • Manage users and access
      • Single Sign-On (SSO) in Azure
      • Manage admin users
      • Manage non-admin users
    • Logs and monitoring
      • Does Syntho collect any data?
      • Temporary data storage by application
  • Syntho API
    • Syntho REST API
Powered by GitBook
On this page
  • Initialization modes overview
  • PII scan
  • Key generator
  • Locale settings
  • User roles

Was this helpful?

  1. Setup Workspaces
  2. Create a workspace

Workspace modes

PreviousAmazon Simple Storage Service (S3)NextEdit a workspace

Last updated 16 days ago

Was this helpful?

With Syntho, you can initialize a workspace by automatically applying suggested generators to all columns based on your workspace mode, speeding up your configuration process.

When creating a workspace, select one of the following modes to control how data is generated.

Initialization modes overview

PII scan

For all workspace modes (except From Scratch), a PII scan is automatically run during workspace creation. This scan detects and configures sensitive columns for de-identification, ensuring privacy compliance from the start.

This step is essential for modes that involve synthetization or de-identification to maintain data privacy and security. For more information, please refer to Automatic PII discovery with PII scanner.

Key generator

Select a default key generator to handle primary key (PK) and foreign key (FK) generation, ensuring data integrity and privacy.

  1. Duplicate: Keeps original key values intact, maintaining relationships between tables.

  2. Generate: Produces entirely new synthetic keys, ensuring privacy without retaining original key relationships.

  3. Hash: Converts original keys into hashed values, preserving table relationships while obfuscating data for enhanced privacy.

You can adjust this setting later in your workspace configuration. For more information, please refer to Key generators.

Locale settings

Set a default locale for mockers and PII processors (e.g., Dutch, English, Japanese, etc.), with fallback to English (US) if your locale isn’t supported. You can adjust this later in workspace settings.

User roles

  • Before workspace creation: Any user can make full use of this feature.

  • After workspace creation: Only users with Editor rights or higher can make full use of this feature.

Mode
When to use
What happens

Synthesize all

To preserve maximum statistical validity with high privacy.

All tables are set to "Synthesize." PII columns are configured with suggested mockers, and non-PII columns use AI-powered generation.

Mock all

Theoretically the most secure, since all data is generated independently of the original data. This is also the best choice if there is no or limited input data available

All tables are set to "De-identify." All PII and non-PII columns are replaced with a suggested mocker.

Mock or mask all

Like “Mock all”, except masking generators may be applied in certain scenarios to generate more realistic data.

All PII columns are replaced with a suggested mocker. All non-PII columns are replaced with a masking generator.

De-identify

When only replacement of PII is required, while non-PII columns should remain in-tact, making it suitable for internal test cases.

All PII columns are replaced with a suggested mocker.

From scratch

For custom configurations or when only a few tables need to be configured.

All tables are initially excluded.