Use case: Import data encrypted using a key generated by Control Panel
In this use case, we will build a workflow in order to import data that has been encrypted in an external system, using a key generated in the Control Panel.
The steps to perform this use case are as follows:
-
Use the Control Panel to generate a key pair (public/private). Detailed steps are available in Control Panel documentation.
- The public key will be shared with the external system, which will use it to encrypt the data to send to Campaign.
- The private key will be used by Campaign Classic to decrypt the incoming encrypted data.
-
In the external system, use the public key downloaded from the Control Panel to encrypt the data to import into Campaign Classic.
-
In Campaign Classic, build a workflow to import the encrypted data and decrypt it using the private key that has been installed via the Control Panel. To do this, we will build a workflow as follows:
- File transfer activity: Transfers the file from an external source to Campaign Classic. In this example, we want transfer the file from an SFTP server.
- Data loading (file) activity: Loads the data from the file into the database and decrypt it using the private key generated in the Control Panel.
-
Open the File transfer activity then specify the external account from which you want to import the encrypted .gpg file.
Global concepts on how to configure the activity are available in this section.
-
Open the Data loading (file) activity, then configure it according to your needs. Global concepts on how to configure the activity are available in this section.
Add a pre-processing stage to the activity, in order to decrypt the incoming data. To do this, select the Pre-process the file option, then select Decrypt from the Command drop-down list:
NOTE
If changes are needed to the available commands, you can reach out to Adobe Customer Care to adjust the preProcessCommand settings.If you are working with an hybrid deployment, you can configure these commands directly from the server configuration file (serverConf.xml). Learn how to configure pre-processing commands in the server configuration file -
Click OK to confirm the activity configuration.
-
You can now run the workflow. Once it is executed, you can check in the workflow logs that the decryption has been executed, and that data from the file have been imported.