Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

A new feature Data Security has been added in Adeptia Suite. This feature enables you to define the action, which can be either Encryption or Decryption that you want to apply to your Adeptia Suite activities. This activity uses the keys created using the Key Manager.
 

Steps to create Data Security

  1. On the Adeptia Suite Home page, click the Develop tab.
  2. Go to Services > Security > Data Security.

...

  1. The Manage Data Security

...

  1.  screen is displayed (see Figure 640).

    Image Modified

...

  1. Figure 640: Manage Data Security

  2. Click the Create New link. The Create Data Security screen is displayed (see Figure 641).

    Image Modified

...

...

  1. Figure 641: New Data Security activity to encrypt a Source File

  2. Enter the name and description of the Data Security in the text-boxes Name and Description respectively.
  3. Select the type of Data Security from the drop-down list Type.

    Image Removed
    Info

    Adeptia Suite version 6.0 and above supports the type PGP.

  4. Select the type of action from the drop-down list Action. This drop-down list has the following options:
    • Encryption
    • Decryption
      If you want to create a Data Security activity for decryption,

...

    • select Decryption. By default, the

...

    • option Encryption

...

    •  is selected.
  1. Select the Key Manager activity that you have created from the drop-down list Key Manager.

    Image Removed
    Info

    This drop-down list will display the Key Manager activities based on the type of action that you have selected in the previous step. For example, if you have selected Encryption from the Action drop-down list, then the Key Manager drop-down list will display the all the Key Manager activities created using the Public Keys i.e. created for encryption.

  2. Click Save to save the Data Security activity.


Similarly, you can create a Data Security activity to decrypt an encrypted source file (see Figure 642).

...


Image Modified

...


Figure 642: Data Security activity to decrypt an encrypted Source File