Technologies for Encryption |
The implementation of the installed encryption technology depends on the environment that you work in. If you work in a SAS enterprise intelligence infrastructure, encryption might be transparent to you because it has already been configured into your site's overall security plan. After the encryption technology has been installed, the site system administrator configures the encryption method (level of encryption) to be used in all client/server data exchanges. All enterprise activity uses the chosen level of encryption, by default. For an example, see SAS/SECURE for the IOM Bridge: Examples.
If you work in a SAS session on a client computer that exchanges data with a SAS server, you will specify SAS system options that implement encryption for the duration of the SAS session. If you connect a SAS/CONNECT client to a spawner, you will specify encryption options in the spawner start-up command. For details about SAS system options, see SAS System Options for Encryption. For examples, see Encryption Technologies: Examples.
Copyright © 2010 by SAS Institute Inc., Cary, NC, USA. All rights reserved.