Storing the hash of the plaintext and the encrypted plaintext next to each other
I generate a random string of 32 characters and then compute the SHA-512 hash then I encrypt the unhashed string. I then save the encrypted text and hash to the database. Is it okay to store the hash of the original text? Will it make the encrypted value less secure, could there be negative consequences from storing the hash of the unencrypted text? If so, what's the reason behind it?
Context:
I have the script on the client side that makes an access token. The token's value is encrypted on the client side, and the private endpoint owner generates a hash for it too. In my database, I only store the encrypted version and the hash. Then, the user who the access token was created for sends a request to a private endpoint with the decrypted access token (which I retrieve from the encrypted form in the database to client side decryption) from their client side. The private endpoint, which is trusted, sends the computed hash of that access token to my server, and I compare it with the one in my database. If they match, I gain access; otherwise, it's a no-go. The request data itself will have a signature. The whole point is that as the owner of the database, I am unable to retrieve the original value of the access token.