Decrypting Data in a Privileged Context
The POST https://<base_url>/privilegedunwrap API returns the DEK that was wrapped using the wrap API without checking the original document or file ACL. Previously known as ‘TakeoutUnwrap. It will be used to decrypt data exported (ex. takeout) from Google in a privileged context.
Request Parameters
| Parameter | Type | Description | 
|---|---|---|
| resource_name | string | Unique identifier for the object. It must match the resource_namethat was used towrapthe key. | 
| authentication | string | A JWT issued by a third party asserting who the user is, or issued by another key service. | 
| reason | string | Additional information about the operation. | 
| wrapped_key | string | The base64 binary object returned by the wrapcall. | 
Example Request
{   
    resource_name: <resource_name>,
    authentication: <Authn-JWT>,
    reason: "",
    wrapped_key: "eyJ3cmFwcGVkX2tleSI6IkozSnZCTEdVOFlWeWlocGpsWXpyd..."
}
Example Response
{
    key: "eyJ3cmFwcGVkX2tleSI6IkozSnZCTEdVOFlWeWlocGpsWXpyd=",
    perimeter_id: ""
}
Response Codes
| Response Code | Description | 
|---|---|
| 2xx | Success | 
| 4xx | Client errors | 
Refer to HTTP status codes for details.