Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Consider the following sample process flow which displays how you can encrypt a source file in Adeptia Suite. This process flow uses the new feature Data Security. The Data Security activity to encrypt a source file uses the Key Manager activity that has been created using a Public Key. Image Removed

Anchor_Toc356133450_Toc356133450 Anchor_Toc401308705_Toc401308705 

Image Added
Figure 643: Process Flow to Encrypt a File


Consider the following sample process flow which displays how you can decrypt an encrypted source file in Adeptia Suite. This process flow also uses the new feature Data Security. However, the Data Security activity to decrypt an encrypted source file uses the Key Manager activity that has been created using a Private Key.

Image Modified

...


Figure 644: Process Flow to Decrypt an Encrypted File

Note the use of Data Security activity for encryption and decryption. For encrypting a source file, you need to use the Data Security activity after Data Mapping whereas for decrypting an encrypted source file, you need to use the Data Security activity before Mapping.
18