What is " the built in scalar function encrypt/decrypt"? But the short answer is almost always: "yes". Every program that 'touches' the encrypted data will need to be reviewed at the very least, and many may need changes.
Any program that needs the real data will then need access to the keys and encryption/decryption API's. And we're back to the key protection/management issues. Limitations? I'd say that the effort has a potential of being a major budget buster. -----Original Message----- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Ron Thomas Sent: Wednesday, November 16, 2011 11:05 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Data encrypt One thing i would like to know is if we go with the built in scalar function encrypt/decrypt for the tables, does that need any kind of application level changes? is there any kind of limitation with this approach? Regards Ron ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html