Encrypt your data when sending files via SFTP

You can encrypt your data when sending your company data files via SFTP for Data File Integrator (DFI).
To configure the encryption:
  1. Go to the
    Properties File Settings
    and switch on
    Encrypted CSV Files
    .
  2. Select AES 256 as the
    Encryption Algorithm
    , then enter the
    Encryption Key
    ,
    Decryption Key
    , and
    Initialization Vector
    .
  3. Select the switch for
    Encrypted CSV Files
    on the
    Properties File Settings
    window.
  4. Enter the
    Encryption Algorithm
    type, AES 256, along with the
    Encryption Key
    ,
    Decryption Key
    , and
    Initialization Vector
    .
    1. When you upload files to the system, DFI checks the mapping file to determine if you have enabled the
      Encrypted CSV Files
      switch. If the switch is turned on, the system will receive an AES 256 encrypted CSV file. DFI uses the
      Encryption Key
      ,
      Decryption Key
      , and
      Initialization Vector
      you provide to decrypt the CSV file. After processing the CSV file, the system creates an output file in encrypted form.
  5. Encrypt the file and configure DFI:
    1. Use your organization's designated encryption system with the AES 256 algorithm to encrypt the CSV file intended for DFI.
    2. Go to the
      Properties File Settings
      screen within the DFI application and enter the
      Encryption Key
      ,
      Decryption Key
      , and
      Initialization Vector
      generated by your encryption system into the corresponding fields in DFI.
    3. Refer to the Technical Considerations listed in the following section.
  6. Ensure the encrypted file retains the standard CSV (.csv) extension.
  7. Prepare the files for processing.
  8. Place the encrypted CSV (.csv) file, properties file, and trigger (.trg) file together in the designated DFI folder, like the standard process for unencrypted files.
    1. This set up ensures DFI can locate and process the encrypted data correctly.
  9. After DFI completes processing, use your organization's encryption system with the AES 256 algorithm to decrypt the resulting output files. These typically end in
    .out.csv
    and
    .reprocess.csv
    .
Technical considerations
Listed are some scripts to generate Encryption/decryption key and Initialization Vector.
Windows PowerShell
Open Windows PowerShell and enter script:
# Generate a new AES managed object $aes = New-Object System.Security.Cryptography.AesManaged # Set the key size to 256 bits $aes.KeySize = 256 # Generate a random key and IV $aes.GenerateKey()$aes.GenerateIV()
# Convert the key and IV to Base64 strings using UTF-8 encoding $keyBase64 = [System.Convert]::ToBase64String($aes.Key) $ivBase64 = [System.Convert]::ToBase64String($aes.IV)
# Output the Base64 encoded key and IV Write-Host "AES 256 Key (Base64): $keyBase64" Write-Host "AES IV (Base64): $ivBase64"
# Dispose of the AES object $aes.Dispose()
Output Example:
AES 256 Key (Base64)
Encryption/decryption key:
mL/JPL+QuNNUqyDJZoRTQ6u+VnwO/zs5MfJXTKzKJsw=
Output example:
AES IV (Base64)
Initialization vector:
5tAspiGXZPZsZp5pDZI/+w==
OpenSSL
openssl rand -base64 32 openssl rand -base64 16
Output example:
C:\Users\123456>openssl rand -base64 32
Encryption/decryption key:
ZFeSuKRotqueGlSlZEK2dt8xNY3sz+p+m+U9lRfXM/E
Output example:
C:\Users\123456>openssl rand -base64 16
Initialization vector:
fSS/pykBvBXbpTWgPHxGtQ==