Encrypt a column using SHA256 hashing algorithm.

Parameters:
operation = HMAC.See dedicated page for more information.
sha256 is a scripted action. Embedded code is accessible and customizable through this tab.
See dedicated page for more information.
The sha256 action computes a secure hash from an input string using the SHA-256 algorithm. It supports multiple operation modes including plain SHA-256, SHA-256 with salt (prepend or append), and HMAC-SHA256 using a secret key. This action is commonly used for secure password hashing, token generation, and verifying data integrity within ETL pipelines.
This action button hashes an input column using one of the following methods:
This is a useful tool in data transformation workflows to securely encode sensitive data such as passwords or identifiers.
⚠️ Security Note: Always ensure salts and secret keys are managed securely and not reused improperly. HMAC is ideal when authentication is required.
Example Input:

Applies SHA256 directly to the string without salt or key.
Action Configuration:
operation: SHA256idColHash: passwordExample Output:

Prepends the salt before hashing. Useful for basic password hashing techniques.
Action Configuration:
operation: SHA256+saltidColHash: passwordidColSalt: saltappendSalt: prepend SaltComputation:
SHA256(salt + password)
Example Output:

Appends the salt after the input string.
Action Configuration:
operation: SHA256+saltidColHash: passwordidColSalt: saltappendSalt: append SaltComputation:
SHA256(password + salt)
Example Output:
| password | salt | SHA256 |
|---|---|---|
| pass123 | S@lt1 | 1260385a18242e2cf9891b1bb4afb28... |
Creates a keyed hash using HMAC with SHA-256. More secure for authentication and integrity checks.
Example Input:
| username | password | key |
|---|---|---|
| alice | pass123 | secretKey1 |
Action Configuration:
operation: HMACidColHash: passwordidKey: keyComputation:
HMAC-SHA256(password, key)
Example Output:
| password | key | SHA256 (HMAC) |
|---|---|---|
| pass123 | secretKey1 | 9b8769a4a742959a2d0298c36fb706... |
SHA256+salt is selected and the idColSalt is left blank, the action behaves like plain SHA256.HMAC requires the idKey field to be filled; otherwise, the hash result may be empty or error-prone.prependSalt when your system expects salts before the data, and appendSalt otherwise.InlineTable or other input buttons: Contains username, password, and salt columns.sha256 with SHA256+salt (prepend).The sha256 action is a flexible and secure hashing utility for ETL pipelines. It supports multiple hashing strategies based on your security needs—from plain hashing to secure keyed HMAC. Use it wherever you need to hash sensitive data such as passwords, tokens, or identifiers.
