You can configure the encryption information for the generator binding on the server or cell level.
Complete the following steps to configure the encryption information for the generator binding on the server level:
To use this algorithm, you must download the unrestricted Java Cryptography Extension (JCE) policy file from the following website: http://www.ibm.com/developerworks/java/jdk/security/index.html.
To use this algorithm, you must download the unrestricted Java Cryptography Extension (JCE) policy file from the following website: http://www.ibm.com/developerworks/java/jdk/security/index.html.
The data encryption algorithm that you select for the generator side must match the data encryption algorithm that you select for the consumer side.
To use this algorithm, you must download the unrestricted Java Cryptography Extension (JCE) policy file from the following website: http://www.ibm.com/developerworks/java/jdk/security/index.html.
To use this algorithm, you must download the unrestricted Java Cryptography Extension (JCE) policy file from the following website: http://www.ibm.com/developerworks/java/jdk/security/index.html.
If you select None, the key is not encrypted.
The key encryption algorithm that you select for the generator side must match the key encryption algorithm that you select for the consumer side.