You re-encrypt policy and key store data to ensure that sensitive data that is encrypted using existing SOA Security Manager algorithms is encrypted using FIPS-compliant algorithms.
| Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |