Limited supportBMC provides limited support for this version of the product. As a result, BMC no longer accepts comments in this space. If you encounter problems with the product version or the space, contact BMC Support.BMC recommends upgrading to the latest version of the product. To see documentation for that version, see BMC AMI Copy for Db2 13.1.

Making encrypted copies


BMC AMI Copy

 supports the encryption feature of the 

Recovery Management for Db2

 solution.

Important

Because the encryption feature is part of the Recovery Management for Db2 solution, making encrypted copies requires use of a valid Recovery Management for Db2 solution password. For more information about encryption and Recovery Management for Db2, see the Recovery Management for Db2 documentation.

The use of encryption protects sensitive company information and prevents security failures. BMC AMI Copy support for encryption allows you to protect image copies from unauthorized access to the sensitive information. You can use BMC AMI Copy to make full and incremental encrypted copies to disk or tape.

Encryption in BMC AMI Copy is based on standard secret key encryption algorithms. You can select encryption based on one of following standard algorithms:

  • The ANSI Data Encryption Algorithm (DEA) with a 64-bit key

    This is the default algorithm (Data Encryption Algorithm, ANSI-X3.92.1981, American National Standards for Information Systems)

  • The Triple Data Encryption Standard (TDES) with a 128-bit key
  • The Advanced Encryption Standard (AES) with a 128-bit key

    This algorithm refers to the Advanced Encryption Standard, Federal Information Processing Standards Publication 197, November 26, 2001.

BMC AMI Copy supports encryption of plain text image copies or decryption of cipher text image copies. Plain text or clear text is data in normal, readable form. (BMC AMI Copy standard image copies are plain text.) Encrypted text or cipher text is data that has been converted to mask its meaning from an unauthorized recipient. BMC AMI Copy encryption involves proprietary data manipulation, in addition to the standard encryption algorithms, which is designed to make the encryption of Db2 page sets more secure.

This section contains the following topics:

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*