Encryption in SAS 9.2
Original Publication Date: 2009-Dec-31
Included in the Prior Art Database: 2015-Sep-19
SAS Institute Inc.
Page 01 of 92
Encryption in SAS® 9.2
Page 02 of 92
The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2009. Encryption in SAS® 9.2. Cary, NC: SAS Institute Inc.
Encryption in SAS® 9.2
Copyright © 2009, SAS Institute Inc., Cary, NC, USA
All rights reserved. Produced in the United States of America.
For a hard-copy book: No part of this publication can be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, or otherwise, without the prior written permission of the publisher, SAS Institute Inc.
For a Web download or e-book: Your use of this publication shall be governed by the terms established by the vendor at the time you acquire this publication.
U.S. Government Restricted Rights Notice. Use, duplication, or disclosure of this software and related documentation by the U.S. government is subject to the Agreement with SAS Institute and the restrictions set forth in FAR 52.227-19 Commercial Computer Software-Restricted Rights (June 1987).
SAS Institute Inc., SAS Campus Drive, Cary, North Carolina 27513.
1st electronic book, February 2009
1st printing, February 2009
SAS® Publishing provides a complete selection of books and electronic products to help customers use SAS software to its fullest potential. For more information about our e-books, e-learning products, CDs, and hard-copy books, visit the SAS Publishing Web site at support.sas.com/publishing or call 1-800-727-3228.
SAS® and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. ® indicates USA registration.
Other brand and product names are registered trademarks or trademarks of their respective companies.
Page 03 of 92
P A R T 1 Encryption in SAS 9.2 1
4 Technologies for Encryption 3
Encryption: Overview 3
Providers of Encryption 4
Encryption Algorithms 9
Encryption: Comparison 11
Encryption: Implementation 11
Accessibility Features in SAS Products 12
Encrypting ODS Generated PDF Files 12
4 SAS System Options for Encryption 15 Chapter 3
4 The PWENCODE Procedure 29
Overview: PWENCODE Procedure 29
Syntax: PWENCODE Procedure 29
Concepts: PWENCODE Procedure 31
Examples: PWENCODE Procedure 31
4 Encryption Technologies: Examples 37 SAS/SECURE for SAS/CONNECT: Example 38
SASProprietary for SAS/SHARE: Example 38
SSL for a SAS/CONNECT UNIX Spawner: Example 39
SSL for a SAS/CONNECT Windows Spawner: Example 41
SSL for SAS/SHARE under UNIX: Example 42
SSL for SAS/SHARE under Windows: Examples 44
SAS/SECURE for the IOM Bridge: Examples 45
SSH Tunnel for SAS/CONNECT: Example 47
SSH Tunnel for SAS/SHARE: Example 48
SSL for a SAS/CONNECT z/OS Spawner: Example 49
SSL for SAS/SHARE under z/OS: Example 51
What's New v
General Enhancements v
P A R T 2 Installing and Configuring SSL 53
4 Installing and Configur...