3 Replies Latest reply: Jan 17, 2013 6:56 PM by Hussein Sawwan-Oracle RSS

    How to make an encrypted output?

    Nippur
      Hi,

      We have EBs 11.5.10.2, database 11g, with financial modules, and now is necessary get the output of payments (flat file) in encrypted format because that is sent to the bank and the user should not see that information, it is possible?

      Thanks in advance.

      Regards.
        • 1. Re: How to make an encrypted output?
          Hussein Sawwan-Oracle
          Nippur wrote:
          Hi,

          We have EBs 11.5.10.2, database 11g, with financial modules, and now is necessary get the output of payments (flat file) in encrypted format because that is sent to the bank and the user should not see that information, it is possible?

          Thanks in advance.

          Regards.
          What is the name of concurrent program you are referring to?

          Do you mean to generate the output in encrypted format and no readable format should be available at all? If yes, then it is not possible.

          What user you want to restrict his/her access from accessing the report? Is it the same user who submit the request?

          If you want to secure the file, you can zip/tar it and use the password protection and send the password to the bank along with the password-protected file.

          Thanks,
          Hussein
          • 2. Re: How to make an encrypted output?
            Srini Chavali-Oracle
            Another option is to use GPG to encrypt the file - http://www.gnupg.org/

            HTH
            Srini
            • 3. Re: How to make an encrypted output?
              Hussein Sawwan-Oracle
              Srini Chavali wrote:
              Another option is to use GPG to encrypt the file - http://www.gnupg.org/

              HTH
              Srini
              There are many tools available to encrypt files (Google should be your friend), but I believe none generates an encrypted concurrent request output files. And IINM, you need to make sure that the other party use the same tool/software/utility to decrypt those encrypted files.

              Thanks,
              Hussein