Encryption Key Source
Part of defining an encryption key is to specify the source of the key value. The source can be changed at any time, and all rules that use that key will get the new key value. Encryption key source allows you to specify the source that you will use for your encryption key. You can enter a key value or generate a key value for each execution. The key value selected here is used whenever this key name is requested by an encryption action within a privacy rule.
To select the source for the key value:
- Choose one of the following sources for the value of your encryption key:
- Key Value: Select this option and type a specific key value. The key value is used exactly as it is entered. The value can contain upper and lower case as well as DBCS characters.
- Generate a key value for each execution: A new key value is generated each time an encryption action is executed. When this option is selected, the results are not repeatable from one execution to another.
Click Finish.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*