How to: |
The following section describes how to configure a PGP preemitter for encryption.
To configure a PGP preemitter:
The Preemitters pane opens as shown in the following image.
The table provided lists any existing preemitters and short descriptions of each.
If the Encrypt method is set to Keypair, then the pass phrase (alias) should be entered for encryption. In the example that is used, the alias is walter (this is my gpg test keystore) <walter_zublionis@ibi.com>. If the Encrypt method is set to Passphrase, then the pass phrase should be entered. In the example that is used, the pass phrase is hello.
If more than one key is present in the same pub key ring file, then the fingerprint needs to be entered while encrypting the message to indicate the specific key to use for encryption. The fingerprint can be obtained as explained in Listing Multiple Sub Keys.
The Name and Description pane opens.
The preemitter is added to the list in the Preemitters pane.
After a preemitter is added to iWay Service Manger, you can assign a preemitter to an outlet that is used to construct a channel.
Parameter |
Description |
---|---|
Encrypt method |
Selects the form of encryption to be used. In this example, select Keypair from the drop-down list. |
Pass Phrase or Alias |
The configured pass phrase or alias. In this example, the following value is used: walter (hello) <walter_zublonis@ibi.com> Note: To avoid typos, it is a good idea to cut and paste this value from a text file. |
armor |
Determines whether an armored message should be generated. In this example, select false from the drop-down list. |
Public key ring |
Full path to the public key ring. Used for key pair encryption. In this example, the following path is used: C:\Program Files\GNU\GnuPG\keys\pubring.gpg |
Secret key ring |
Full path to the secret key ring. Used for key pair encryption. In this example, the following path is used: C:\Program Files\GNU\GnuPG\keys\secring.gpg |
Sign |
Determines whether messages should be signed. In this example, select false from the drop-down list. |
algorithm |
The algorithm that is used. In this example, select cast5 from the drop-down list. |
FingerPrint |
Fingerprint of the Encryption Hex Decimal Key. In this example, do not provide a value for this parameter. This value can be specified if you are using a key ring, which contains multiple keys. |
iWay Software |