Technologies for Encryption |
The implementation
of the installed encryption technology depends on the environment that you
work in. If you work in a SAS enterprise intelligence infrastructure, encryption
might be transparent to you because it has already been configured into your
site's overall security plan. After the encryption technology has been installed,
the site system administrator configures the encryption method (level of encryption)
to be used in all client/server data exchanges. All enterprise activity uses
the chosen level of encryption, by default. For an example, see SAS/SECURE for the IOM Bridge: Examples.
If you work in a SAS session on a client computer
that exchanges data
with a SAS server, you will specify SAS system options that implement encryption
for the duration of the SAS session. If you connect a SAS/CONNECT client
to a spawner, you will specify encryption options in the spawner start-up
command. For details about SAS system options, see SAS System Options for Encryption. For examples, see
Encryption Technologies: Examples.
Copyright © 2010 by SAS Institute Inc., Cary, NC, USA. All rights reserved.