Common

Configure Secure

The Secure feature enables specific legacy data fields to be encrypted. The columns to be encrypted can be masked so that a portion of the original data can still be used during the migration project.

Once the migration process is complete, the data is then decrypted and sent to the target ERP system via RFC (SAP only) or File format.

The Secure configuration includes the following steps:

Add Keys

A secure key defines the encryption algorithm and password used to encrypt and decrypt legacy data. As many keys can be defined and reused as necessary for the needs of the project. For example, a single key can be shared by a Migration Team to encrypt all the data for an object or a single key can be defined and used on only one column by one team member.

Team members that export and load data into the target system do not need to know the password in order to encrypt the data. The password can be set up by one person who is administrating the data. The password in the table must be encrypted by using the Stewardship Tier encryption processes in data sources. The decrypt process runs automatically with only the person who set up the process knowing the password.

To add keys:

Create a Secure Key

To create a secure key:

  1. Select Configuration > Modules > Keys in Navigation pane.
  2. Click Add.

    View the field descriptions for the Keys page

  3. Enter a value in KEYIDENTIFIER field.

    NOTE: The KEY IDENTIFIER is the name used to identify the key during the encryption and decryption processes. It should be recognizable by the Data Migration teams.

  4. Enter a value in KEYPASSWORD field.

    NOTE: The KEY PASSWORD should be a strong password. A strong password is at least eight characters in length and contains a capital letter, a number and a special character, e.g., @lantaGA2013. The password is encrypted using Stewardship Tier encryption and stored in the table, but is not visible on the web page. Once created, the password cannot be modified. Refer to Forgotten/Incorrect Passwords for more information.

  5. Update KEY ALGORITHM list box if the default value is not applicable.
  6. Click Save.

Forgotten/Incorrect Encryption Password

If the encryption password is forgotten or is incorrect, it cannot be modified. Conduct the following steps if the password is forgotten:

  1. Create a new secure key.
  2. Re-apply the key to the source data.
  3. Refresh the source data in Common to encrypt the legacy data with the new secure key.
  4. Delete the existing key.

The new key does not take effect until the source data download process is run.

Configure Secure Parameters

Parameters are Secure-specific settings that must be configured per installation. Parameters are delivered with recommended default values. Review these values and make any changes necessary for the installation.

To configure secure parameters:

  1. Select Configuration > Modules > Parameters-Secure in Navigation pane.
  2. Click Edit.

    View the field descriptions for the Parameters-Secure page

  3. Update all fields if default values are not applicable.
  4. Click Save.