Key Encryption of Data
Encrypt and Decrypt Data with the eiConsole’s Encryption and Decryption Processors
The Encryption and Decryption Processors in the eiPlatform and eiConsole provide a number of mechanisms that allow you to encrypt and decrypt data. As with all the components of the eiConsole, the user is presented with a graphical interface with easy to configure panels. To configure the Encryption and Decryption Processors on the Processor Configuration tab, the user clicks the Processor Type drop-down and in the example below, select Asymmetric Decryption.
Next name this Processor: Decrypt and select Add.
The Processor will now appear on the main grid with the Basic set of configuration items.
Then you will be asked to provide the PrivateKey file used to decrypt the data and the PrivateKey password that’s used to protect the PrivateKey. If you would like to verify the signature with which the PrivateKey was signed, click the Verify signature checkbox and specify the PublicKey. The Private and PublicKey files are typically placed underneath the route folder. The paths entered in these text boxes will be relevant to that folder, or may also be an absolute path to the file route system.
Next, choose to add a Processor and select Asymmetric Encryption.
Name the Processor: Encrypt and select Add.
Select the Processor that you just added from the Processor Configuration screen and a set of Basic configuration items will appear. This will allow you to choose the Encryption algorithm (CAST5, BlowFish, Triple-DES and IDEA).
Add the name of the file once it’s encrypted and the PublicKey to use for the encryption. Next, choose whether or not to sign the data by using the check box next to Sign data. If signed, add where the PrivateKey file lives and the PrivateKey password.