Home kellton

Main navigation

  • Services
    • Digital Business Services
      • AI & ML
        • Agentic AI Platform
        • Rapid Customer Verification
        • NeuralForge
        • Utilitarian AI
        • Predictive Analytics
        • Generative AI
        • Machine Learning
        • Data Science
        • RPA
      • Digital Experience
        • Product Strategy & Consulting
        • Product Design
        • Product Management
      • Product Engineering
        • Digital Application Development
        • Mobile Engineering
        • IoT & Wearables Solutions
        • Quality Engineering
      • Data & Analytics
        • Data Consulting
        • Data Engineering
        • Data Migration & Modernization
        • Analytics Services
        • Integration & API
      • Cloud Engineering
        • Cloud Consulting
        • Cloud Migration
        • Cloud Managed Services
        • DevSecOps
      • NextGen Services
        • Blockchain
        • Web3
        • Metaverse
        • Digital Signage Solutions
    • SAP
      • SAP Services
        • S/4HANA Implementations
        • SAP AMS Support
        • SAP Automation
        • SAP Security & GRC
        • SAP Value Added Solutions
        • Other SAP Implementations
      • View All Services
  • Platforms & Products
    • Audit.io
    • Kai SDLC 360
    • Tasks.io
    • Optima
    • tHRive
    • Kellton4Health
    • Kellton4Commerce
    • KLGAME
    • Our Data Accelerators
      • Digital DataTwin
      • SmartScope
      • DataLift
      • SchemaLift
      • Reconcile360
    • View All Products
  • Industries
    • Fintech, Banking, Financial Services & Insurance
    • Retail, E-Commerce & Distribution
    • Pharma, Healthcare & Life Sciences
    • Non-Profit, Government & Education
    • Travel, Logistics & Hospitality
    • HiTech, SaaS, ISV & Communications
    • Manufacturing
    • Oil,Gas & Mining
    • Energy & Utilities
    • View All Industries
  • Our Partners
    • AWS
    • Microsoft
    • ServiceNow
    • View All Partners
  • Insights
    • Blogs
    • Brochures
    • Success Stories
    • News / Announcements
    • Webinars
    • White Papers
  • Careers
    • Life At Kellton
    • Jobs
  • About
    • About Us
    • Our Leadership
    • Testimonials
    • Analyst Recognitions
    • Investors
    • Corporate Sustainability
    • Privacy-Policy
    • Contact Us
    • Our Delivery Centers
      • India Delivery Center
      • Europe Delivery Center
Search
  1. Home
  2. All Insights
  3. Blogs

Encryption and Decryption of Data Using Pretty Good Privacy (PGP) with the Advantco Modules in SAP PI/PO

SAP
September 17 , 2018
Posted By:
Kellton
4 min read
Banner - Encryption and Decryption of Data Using Pretty Good Privacy (PGP) with the Advantco Modules in SAP PI/PO

Other recent blogs

ServiceNow AI Capabilities
ServiceNow AI Capabilities: New Interface & AI Experience
December 05 , 2025
SAP S/4HANA Data Migration
SAP S/4HANA Data Migration approach guide in AI-first landscape
December 01 , 2025
Agentic AI in Healthcare Trends
Agentic AI in Healthcare: Types, Trends and 2026 forecast
November 27 , 2025

Let's talk

Reach out, we'd love to hear from you!

Image CAPTCHA
Enter the characters shown in the image.
Get new captcha!

Advantco provides two PGP adapter modules—the OpenPGP Sender Module and the OpenPGP Receiver Module. These modules are used to encrypt and decrypt messages and can be deployed on PI/PO servers. They work in tandem to ensure the validity and security of data as it is exchanged in and out of the SAP system.

Asset

1. Advantco OpenPGP Sender Module

The OpenPGP sender module is used as the sender of PGP messages. It can do the following tasks:

●    Encrypt message payload
●    Sign message payload
●    Compress message payload

The OpenPGP sender module is used in the receiver adapter of SAP PI (Process Integration). The adapter module is configured under the “modules” tab of the SAP PI receiver adapter. 

2. Advantco OpenPGP Receiver Module

The OpenPGP receiver module is used as the receiver of PGP messages. It can do the following tasks:

  • Decrypt message payload
  • Verify signed message payload
  • Decompress message payload

OpenPGP receiver module is used in the sender adapter of SAP PI. The adapter module is configured under the “modules” tab of the SAP PI sender adapter. 

Key Management for Advantco PGP Modules

The Advantco OpenPGP adapter modules can access PGP keys from two locations, the Netweaver J2EE Database of the SAP PI System or directly from the local file server of PI. While both are acceptable storage locations, accessing the PGP keys via the Netweaver J2EE Database of the SAP PI System offers some distinct advantages, both for security and ease of management, making it the recommended approach.

1. Netweaver J2EE Database of the SAP PI System (Recommended Approach)

When keys are stored in the Netweaver J2EE Database of the SAP PI System, the encryption and ongoing maintenance of keys are done using the OpenPGP key manager. It can be accessed via a web browser and provides an excellent user interface to create/update/delete keys. It also allows you to implement security settings so that only designated resources have access to view/edit keys. It provides robust functionality to import/generate new keys. Below are some of the standard features provided by OpenPGP Key Manager:

  • Generating PGP Key Pairs generate PGP key pairs for encryption and/or message signature.
  • Importing/Exporting PGP Keys import/export keys via a Keyring file (a file in which public and secret keys are kept). Importing someone’s public key allows you to decrypt their email and check their digital signature against their public key on your keyring. This enables you to verify the validity of future files or documents sent from those entities by comparing them against the keys in your keyring.
  • Deleting PGP Keys delete PGP keys, which are no longer required.
  • Editing PGP Keys enables the modification of PGP keys.
  • Backup PGP Keys allows us to backup all PGP keys and store them on a Database/Keyring file.
  • Setting Key Expiry Dates determine and set a date on which a key will expire.
  • Changing Key Passphrase allows us to change the passphrase for the keys.
  • Changing Key Encryption Algorithm allows us to change the algorithm, which is used for message encryption.
  • Search for Keys allows us to search for keys based on Key ID, User ID, etc.

2. Storing Keys on a Local File Server of SAP PI (Not Recommended):

This is the second approach to key management and involves storing keys directly on the SAP PI server. It does not provide a user interface to maintain keys and change security settings to restrict access (at the file server level) to view/edit keys. As the number of keys increases, this key storage and maintenance method becomes increasingly cumbersome and error-prone while posing vital security concerns.

 

Asset2

Want to know more?

SAP S/4HANA Data Migration
Blog
SAP S/4HANA Data Migration approach guide in AI-first landscape
December 01 , 2025
SAP ECC to S4HANA migration
Blog
Why your SAP ECC to S/4HANA migration can’t wait: The 2027 deadline impact
November 24 , 2025
SAP ECC to S/4HANA Migration
Blog
SAP ECC to S/4HANA migration challenges: Preparing for the future of intelligent ERP
August 01 , 2025

North America: +1.844.469.8900

Asia: +91.124.469.8900

Europe: +44.203.807.6911

Email: ask@kellton.com

Footer menu right

  • Services
  • Platforms & Products
  • Industries
  • Insights

Footer Menu Left

  • About
  • News
  • Careers
  • Contact
LinkedIn Twitter Youtube Facebook