Browse Prior Art Database

Data Security Technologies in SAS 9.1.3 Disclosure Number: IPCOM000244069D
Original Publication Date: 2005-Dec-31
Included in the Prior Art Database: 2015-Nov-09

Publishing Venue

SAS Institute Inc.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 6% of the total text.

Page 01 of 60

Data Security Technologies in SAS® 9.1.3

Page 02 of 60

The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. Data Security Technologies in SAS® 9.1.3. Cary, NC: SAS Institute Inc.

Data Security Technologies in SAS® 9.1.3

Copyright © 2005, SAS Institute Inc., Cary, NC, USA

ISBN 1-59047-719-7
All rights reserved. Produced in the United States of America.

For a hard-copy book: No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, or otherwise, without the prior written permission of the publisher, SAS Institute Inc.

For a Web download or e-book: Your use of this publication shall be governed by the terms established by the vendor at the time you acquire this publication.

U.S. Government Restricted Rights Notice. Use, duplication, or disclosure of this software and related documentation by the U.S. government is subject to the Agreement with SAS Institute and the restrictions set forth in FAR 52.227-19 Commercial Computer Software-Restricted Rights (June 1987).

SAS Institute Inc., SAS Campus Drive, Cary, North Carolina 27513.
1st printing, February 2005
SAS Publishing provides a complete selection of books and electronic products to help customers use SAS software to its fullest potential. For more information about our e-books, e-learning products, CDs, and hard-copy books, visit the SAS Publishing Web site at or call 1-800-727-3228.

SAS® and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. ® indicates USA registration.

Other brand and product names are registered trademarks or trademarks of their respective companies.

Page 03 of 60

P A R T 1 Data Security Technologies in SAS 9.1.3 1
Chapter 1

4 Technologies for Data Security 3

Data Security Technologies: Overview 3 Providers of Data Security Technologies 4 Data Encryption Algorithms 8
Data Security Technologies: Comparison 9 Data Security Technologies: Implementation 10

Chapter 2

      4 SAS System Options for Data Security 11 Chapter 3

4 Data Security Technologies: Examples 21

SAS/SECURE for SAS/CONNECT: Example 21 SASProprietary for SAS/SHARE: Example 22
SSL for a SAS/CONNECT UNIX Spawner: Example 23 SSL for a SAS/CONNECT Windows Spawner: Example 24 SSL for SAS/SHARE under UNIX: Example 26
SSL for SAS/SHARE under Windows: Examples 27 SAS/SECURE for the IOM Bridge: Examples 28
SSH Tunnel for SAS/CONNECT: Example 30
SSH Tunnel for SAS/SHARE: Example 30


P A R T 2 Installing and Configuring SSL 33

Appendix 1

4 Installing and Configuring SSL under UNIX 35

SSL under UNIX: System and Software Requirements 35 Setting Up Digital Certificates for SSL under UNIX 36 Converting between PEM and DER File Formats for SSL 40

Appendix 2

       4 Installing and Configuring SSL under Windows 41 SSL under Windows: System and Software Requirements 4...