IDMS

IUAD6 Database Procedures for Security.pdf 

Dec 17, 2014 11:56 AM

Session given by Laura Rochon, Hera Evolution at IUA/CA IDMS Technical Conference December 2014

 

Abstract:  This presentation lays out the steps needed to write a database exit to encrypt and decrypt CA IDMS data at a field level. Sample code will be provided as well as all the accompanying external updates such as Schema and SYSGEN.

Statistics
0 Favorited
0 Views
1 Files
0 Shares
0 Downloads
Attachment(s)
pdf file
IUAD6 Database Procedures for Security.pdf   721 KB   1 version
Uploaded - May 29, 2019

Related Entries and Links

No Related Resource entered.