Hi, I'm Ask INFA!
What would you like to know?
ASK INFAPreview
Please to access Ask INFA.

Table of Contents

Search

  1. Introducing Mass Ingestion
  2. Getting Started with Mass Ingestion
  3. Connectors and Connections
  4. Mass Ingestion Applications
  5. Mass Ingestion Databases
  6. Mass Ingestion Files
  7. Mass Ingestion Streaming
  8. Monitoring Mass Ingestion Jobs
  9. Asset Management
  10. Troubleshooting

Mass Ingestion

Mass Ingestion

Mass Ingestion Files security

Mass Ingestion Files
security

Use the encryption and decryption methods to secure files that a
file ingestion
job transfers.
When you define the file ingestion task, you can specify the encryption and decryption methods to use. For more information, see Mass Ingestion Files actions.
File ingestion
jobs use the PGP method to encrypt and decrypt files. To encrypt files, you must provide a key ID. To decrypt files, you must provide a key passphrase.
If your user privileges allow you to update files in the agent location, you can use the key ring command line interface (CLI) to manage key IDs. For more information, see Key ring command reference. If you do not have the privilege to access the agent location, ask your administrator for the key ID and key passphrase.
GPG method is compatible with the PGP method to encrypt and decrypt files.

Encryption

When you configure the encryption action for a
file ingestion
task, you provide a key ID. The key ID is the public key ID of the receiver who decrypts the file. You can also add your private key ID and key passphrase to sign the files.

Decryption

When you configure the decryption action for a
file ingestion
task, you provide a key passphrase. The key passphrase is the private key passphrase of the receiver who decrypts the file.

0 COMMENTS

We’d like to hear from you!