Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

Consider the following sample process flow which displays how you can encrypt a source file in Adeptia Suite. This process flow uses the new feature Data Security. The Data Security activity to encrypt a source file uses the Key Manager activity that has been created using a Public Key.

Figure 643: Process Flow to Encrypt a File
Consider the following sample process flow which displays how you can decrypt an encrypted source file in Adeptia Suite. This process flow also uses the new feature Data Security. However, the Data Security activity to decrypt an encrypted source file uses the Key Manager activity that has been created using a Private Key.

Figure 644: Process Flow to Decrypt an Encrypted File
Note the use of Data Security activity for encryption and decryption. For encrypting a source file, you need to use the Data Security activity after Data Mapping whereas for decrypting an encrypted source file, you need to use the Data Security activity before Mapping.
18

  • No labels