File Ingestion and Replication > File Ingestion and Replication > File Ingestion and Replication security
  

File Ingestion and Replication security

Use the encryption and decryption methods to secure files that a file ingestion and replication job transfers.
When you define the file ingestion and replication task, you can specify the encryption and decryption methods to use. For more information, see File Ingestion and Replication actions.
File ingestion and replication jobs use the PGP method to encrypt and decrypt files. To encrypt files, you must provide a key ID. To decrypt files, you must provide a key passphrase.
If your user privileges allow you to update files in the agent location, you can use the key ring command line interface (CLI) to manage key IDs. For more information, see Key ring command reference. If you do not have the privilege to access the agent location, ask your administrator for the key ID and key passphrase.
Note: GPG method is compatible with the PGP method to encrypt and decrypt files.

Encryption

When you configure the encryption action for a file ingestion and replication task, you provide a key ID. The key ID is the public key ID of the receiver who decrypts the file. You can provide a file suffix. You can also add your private key ID and key passphrase to sign the files.

Decryption

When you configure the decryption action for a file ingestion and replication task, you provide a key passphrase. The key passphrase is the private key passphrase of the receiver who decrypts the file.