Browse Prior Art Database

Encryption in SAS 9.2

IP.com Disclosure Number: IPCOM000243367D
Original Publication Date: 2009-Dec-31
Included in the Prior Art Database: 2015-Sep-19
Document File: 92 page(s) / 2M

Publishing Venue

SAS Institute Inc.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 5% of the total text.

Page 01 of 92

Encryption in SAS® 9.2

SAS® Documentation



Page 02 of 92

The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2009. Encryption in SAS® 9.2. Cary, NC: SAS Institute Inc.

Encryption in SAS® 9.2

Copyright © 2009, SAS Institute Inc., Cary, NC, USA


ISBN 978-1-59994-865-2
All rights reserved. Produced in the United States of America.

For a hard-copy book: No part of this publication can be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, or otherwise, without the prior written permission of the publisher, SAS Institute Inc.

For a Web download or e-book: Your use of this publication shall be governed by the terms established by the vendor at the time you acquire this publication.

U.S. Government Restricted Rights Notice. Use, duplication, or disclosure of this software and related documentation by the U.S. government is subject to the Agreement with SAS Institute and the restrictions set forth in FAR 52.227-19 Commercial Computer Software-Restricted Rights (June 1987).

SAS Institute Inc., SAS Campus Drive, Cary, North Carolina 27513.
1st electronic book, February 2009
1st printing, February 2009
SAS® Publishing provides a complete selection of books and electronic products to help customers use SAS software to its fullest potential. For more information about our e-books, e-learning products, CDs, and hard-copy books, visit the SAS Publishing Web site at support.sas.com/publishing or call 1-800-727-3228.

SAS® and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. ® indicates USA registration.

Other brand and product names are registered trademarks or trademarks of their respective companies.


Page 03 of 92

P A R T 1 Encryption in SAS 9.2 1
Chapter 1

4 Technologies for Encryption 3

Encryption: Overview 3
Providers of Encryption 4
Encryption Algorithms 9
Encryption: Comparison 11

Encryption: Implementation 11

Accessibility Features in SAS Products 12

Encrypting ODS Generated PDF Files 12

Chapter 2

      4 SAS System Options for Encryption 15 Chapter 3

4 The PWENCODE Procedure 29

Overview: PWENCODE Procedure 29

Syntax: PWENCODE Procedure 29

Concepts: PWENCODE Procedure 31

Examples: PWENCODE Procedure 31

Chapter 4

      4 Encryption Technologies: Examples 37 SAS/SECURE for SAS/CONNECT: Example 38

SASProprietary for SAS/SHARE: Example 38

SSL for a SAS/CONNECT UNIX Spawner: Example 39

SSL for a SAS/CONNECT Windows Spawner: Example 41

SSL for SAS/SHARE under UNIX: Example 42

SSL for SAS/SHARE under Windows: Examples 44

SAS/SECURE for the IOM Bridge: Examples 45

SSH Tunnel for SAS/CONNECT: Example 47

SSH Tunnel for SAS/SHARE: Example 48

SSL for a SAS/CONNECT z/OS Spawner: Example 49

SSL for SAS/SHARE under z/OS: Example 51

Contents

What's New v


Overview v
General Enhancements v

P A R T 2 Installing and Configuring SSL 53

Appendix 1

       4 Installing and Configur...