For example, the following
code fragment performs steps 1 through 4 of the suggested process.
In this example, X is the encrypted library, B is a table that has
referential integrity constraints, and FKB is a foreign key within
table B.
proc copy in=x out=emptydir override=(pw=secret2) constraint=yes;
run;
proc datasets library=x;
modify b;
ic delete fkb;
run;
quit;
proc datasets library=x kill;
run;
proc authlib library=x;
modify pw=secret/secret2;
run;
quit;
proc copy in=emptydir out=x constraint=yes;
run;
To complete the process
(step 5), the following code fragment deletes the copy of the physical
tables from the WORK library.
proc datasets library=emptydir;
modify b(pw=secret2);
ic delete fkb;
run;
quit;
proc datasets library=emptydir kill pw=secret2;
run;