What is " the built in scalar function encrypt/decrypt"?

But the short answer is almost always: "yes". Every  program that 'touches' the 
encrypted data will need to be reviewed at the very least, and many may need 
changes. 

Any program that needs the real data will then need access to the keys and 
encryption/decryption API's. And we're back to the key protection/management 
issues. 

Limitations? I'd say that the effort has a potential of being a major budget 
buster.  
 
-----Original Message-----
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Ron Thomas
Sent: Wednesday, November 16, 2011 11:05 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Data encrypt

One thing i would like to know is if we go with the built in scalar function 
encrypt/decrypt  for the tables, does that need any kind of application level 
changes? is there any kind of limitation with this approach?

Regards
Ron

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html
NOTICE: This electronic mail message and any files transmitted with it are 
intended
exclusively for the individual or entity to which it is addressed. The message, 
together with any attachment, may contain confidential and/or privileged 
information.
Any unauthorized review, use, printing, saving, copying, disclosure or 
distribution 
is strictly prohibited. If you have received this message in error, please 
immediately advise the sender by reply email and delete all copies.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to