IUAD6 Database Procedures for Security.pdf

File uploaded by Carla_Pereira Employee on Dec 17, 2014
Version 1Show Document
  • View in full screen mode

Session given by Laura Rochon, Hera Evolution at IUA/CA IDMS Technical Conference December 2014

 

Abstract:  This presentation lays out the steps needed to write a database exit to encrypt and decrypt CA IDMS data at a field level. Sample code will be provided as well as all the accompanying external updates such as Schema and SYSGEN.

Outcomes