Maintaining Database Encryption
•If the database has previously been encrypted, and the required information can be resolved from the erwinDataTransformation.properties file in the erwin DT install directory, these values will be read into the erwin Data Transformation configuration. However, the user will be blocked from changing or removing the database file encryption without first re-entering the existing credentials.
•If the database file has previously been encrypted but the erwin DT configuration is unaware of the previous encryption settings (e.g. if it has been encypted by a source other than erwin DT, or if the configuration settings have been deleted), then the user should enter the credentials required to read the encrypted file.
Changing or Removing File Encryption
To change the encryption, select the current and new key stores, and provide the necessary credentials.
To remove the encryption, select “Remove Encryption”.
The “Email” tab allows the user to provide parameters that erwin DT will use to manage domain support and error notification by email:
-E-mail to: insert the e-mail addresses erwin DT will send communications to in case of error (one or more e-mail addresses separated by “,” or “;”)
-E-mail from: insert an e-mail address erwin DT will use as sender in the e-mail notification
-SMTP host: insert the host name of the Outgoing mail server
-SMTP username: insert the username of a valid email server account, which erwin DT will use to send the e-mail notification
-SMTP password: insert the password of a valid email server account, which erwin DT will use to send the e-mail notifications
-SMTP port: insert the SMTP port if the port is different by the default one
-Server authenticated: check the Server authenticated check box if erwin DT will use an authenticated server to send the e-mail notifications
Proxy
The proxy tab enables the proxy configuration settings, in case a proxy is in place to manage the connections with the Internet; complete with proxy host and port, and userid /password if the proxy is authenticated.
The OK button saves the configuration.
© ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center