on 05-28-2015 12:25 PM
Hi All
I have a file to file scenario in which i have to encrypt the file . So first we used PGP module on the receiver side.
But the data was visible inside PI monitoring . And customer was not happy with that.
So we just used PGP encryption module on sender side .
The amazing thing is we are not able to see the message details inside PI and encrypted file is getting delivered on target side successfully.
Please help in understanding why its behaving like this .
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
You are not doing any mapping in between, correct?
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
There you go,
This is how file adapter will work in this case,
Physical File=>Input Stream (Reading)=>Sender File Adapter==>PGP encrypted data (Monitoring encrypted Data)==>Receiver File Adapter=>Output Stream(All encrypted data in bytes, in simple terms 0 and 1) (writing) =>PGP Encrypted File
I/O Streams (The Java™ Tutorials > Essential Classes > Basic I/O)
In your previous case,
Physical File=>Input Stream (Reading)=>Sender File Adapter==>File data (Monitoring non encrypted data)=>Receiver File Adapter=>PGP Encryption=>Output Stream(All encrypted data in bytes, in simple terms 0 and 1) (writing)=>PGP Encrypted File
Hi,
Havent seen any documentation saying that it wont be visible but it does make sense that you wont see any details. It encrypts the entire payload. So it is not possible to view the payload because it is encrypted.
Have you switched on your logging to full on the ICO?
Regards,
Jannus Botha
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
HI Jannus Botha
True it makes sense . My intention of asking this question was as you said that it was never captured any documentation.
Full logging on ICO its not required because its a plain transfer without mapping and any XML validation.
My point is that we can use this if we want to do encryption without payload being visible inside PI if there is no data manipulation.
Regards
Sandeep
User | Count |
---|---|
84 | |
23 | |
11 | |
9 | |
8 | |
5 | |
5 | |
5 | |
5 | |
4 |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.