Home kellton

Main navigation

  • Services
    • Digital Business Services
      • AI & ML
        • Utilitarian AI
        • Predictive Analytics
        • Generative AI
        • Machine Learning
        • Data Science
        • RPA
      • Digital Experience
        • Product Strategy & Consulting
        • Product Design
        • Product Management
      • Product Engineering
        • Digital Application Development
        • Mobile Engineering
        • IoT & Wearables Solutions
        • Quality Engineering
      • Data & Analytics
        • Data Consulting
        • Data Engineering
        • Data Migration & Modernization
        • Analytics Services
        • Integration & API
      • Cloud Engineering
        • Cloud Consulting
        • Cloud Migration
        • Cloud Managed Services
        • DevSecOps
      • NextGen Services
        • Blockchain
        • Web3
        • Metaverse
        • Digital Signage Solutions
    • SAP
      • SAP Services
        • S/4HANA Implementations
        • SAP AMS Support
        • SAP Automation
        • SAP Security & GRC
        • SAP Value Added Solutions
        • Other SAP Implementations
      • View All Services
  • Platforms & Products
    • Audit.io
    • AiQ
    • Tasks.io
    • Optima
    • tHRive
    • Kellton4Health
    • Kellton4Commerce
    • KLGAME
    • Our Data Accelerators
      • Digital DataTwin
      • SmartScope
      • DataLift
      • SchemaLift
      • Reconcile360
    • View All Products
  • Industries
    • Fintech, Banking, Financial Services & Insurance
    • Retail, E-Commerce & Distribution
    • Pharma, Healthcare & Life Sciences
    • Non-Profit, Government & Education
    • Travel, Logistics & Hospitality
    • HiTech, SaaS, ISV & Communications
    • Manufacturing
    • Oil,Gas & Mining
    • Energy & Utilities
    • View All Industries
  • Our Partners
  • Insights
    • Blogs
    • Brochures
    • Success Stories
    • News / Announcements
    • Webinars
    • White Papers
  • Careers
    • Life At Kellton
    • Jobs
  • About
    • About Us
    • Our Leadership
    • Testimonials
    • Analyst Recognitions
    • Investors
    • Corporate Sustainability
    • Privacy-Policy
    • Contact Us
    • Our Delivery Centers
      • India Delivery Center
      • Europe Delivery Center
Search
  1. Home
  2. All Insights
  3. Blogs

Encryption and Decryption of Data Using Pretty Good Privacy (PGP) with the Advantco Modules in SAP PI/PO

SAP
September 17 , 2018
Posted By:
Kellton
linkedin
Banner - Encryption and Decryption of Data Using Pretty Good Privacy (PGP) with the Advantco Modules in SAP PI/PO

Other recent blogs

enterprises ride the AI wave in 2025
Should enterprises ride the AI wave in 2025 — or risk falling behind?
June 13 , 2025
Testing AI applications and ML models
Testing AI applications and ML models: Revealing proven quality assurance strategies and techniques
June 11 , 2025
AI Agents vs Agentic AI
AI Agents vs Agentic AI: Essential insights every CTO must know
June 10 , 2025

Let's talk

Reach out, we'd love to hear from you!

Image CAPTCHA
Enter the characters shown in the image.
Get new captcha!

Advantco provides two PGP adapter modules—the OpenPGP Sender Module and the OpenPGP Receiver Module. These modules are used to encrypt and decrypt messages and can be deployed on PI/PO servers. They work in tandem to ensure the validity and security of data as it is exchanged in and out of the SAP system.

Asset

1. Advantco OpenPGP Sender Module

The OpenPGP sender module is used as the sender of PGP messages. It can do the following tasks:

●    Encrypt message payload
●    Sign message payload
●    Compress message payload

The OpenPGP sender module is used in the receiver adapter of SAP PI (Process Integration). The adapter module is configured under the “modules” tab of the SAP PI receiver adapter. 

2. Advantco OpenPGP Receiver Module

The OpenPGP receiver module is used as the receiver of PGP messages. It can do the following tasks:

  • Decrypt message payload
  • Verify signed message payload
  • Decompress message payload

OpenPGP receiver module is used in the sender adapter of SAP PI. The adapter module is configured under the “modules” tab of the SAP PI sender adapter. 

Key Management for Advantco PGP Modules

The Advantco OpenPGP adapter modules can access PGP keys from two locations, the Netweaver J2EE Database of the SAP PI System or directly from the local file server of PI. While both are acceptable storage locations, accessing the PGP keys via the Netweaver J2EE Database of the SAP PI System offers some distinct advantages, both for security and ease of management, making it the recommended approach.

1. Netweaver J2EE Database of the SAP PI System (Recommended Approach)

When keys are stored in the Netweaver J2EE Database of the SAP PI System, the encryption and ongoing maintenance of keys are done using the OpenPGP key manager. It can be accessed via a web browser and provides an excellent user interface to create/update/delete keys. It also allows you to implement security settings so that only designated resources have access to view/edit keys. It provides robust functionality to import/generate new keys. Below are some of the standard features provided by OpenPGP Key Manager:

  • Generating PGP Key Pairs generate PGP key pairs for encryption and/or message signature.
  • Importing/Exporting PGP Keys import/export keys via a Keyring file (a file in which public and secret keys are kept). Importing someone’s public key allows you to decrypt their email and check their digital signature against their public key on your keyring. This enables you to verify the validity of future files or documents sent from those entities by comparing them against the keys in your keyring.
  • Deleting PGP Keys delete PGP keys, which are no longer required.
  • Editing PGP Keys enables the modification of PGP keys.
  • Backup PGP Keys allows us to backup all PGP keys and store them on a Database/Keyring file.
  • Setting Key Expiry Dates determine and set a date on which a key will expire.
  • Changing Key Passphrase allows us to change the passphrase for the keys.
  • Changing Key Encryption Algorithm allows us to change the algorithm, which is used for message encryption.
  • Search for Keys allows us to search for keys based on Key ID, User ID, etc.

2. Storing Keys on a Local File Server of SAP PI (Not Recommended):

This is the second approach to key management and involves storing keys directly on the SAP PI server. It does not provide a user interface to maintain keys and change security settings to restrict access (at the file server level) to view/edit keys. As the number of keys increases, this key storage and maintenance method becomes increasingly cumbersome and error-prone while posing vital security concerns.

 

Asset2

Want to know more?

SAP S4 HANA Implementation
Blog
A complete guide to SAP S/4 HANA implementation
November 21 , 2024
SAP Upgrade guide
Blog
SAP S/4HANA upgrade guide: Why upgrading to higher version is more crucial than ever
October 03 , 2024
SAP Cloud Private vs Public
Blog
SAP S/4HANA Cloud Editions: Private vs. Public Cloud—which is right?
September 02 , 2024

North America: +1.844.469.8900

Asia: +91.124.469.8900

Europe: +44.203.807.6911

Email: ask@kellton.com

Footer menu right

  • Services
  • Platforms & Products
  • Industries
  • Insights

Footer Menu Left

  • About
  • News
  • Careers
  • Contact
LinkedIn LinkedIn twitter Twitter Youtube Youtube
Recognized as a leader in Zinnov Zones Digital Engineering and ER&D services
Kellton: 'Product Challenger' in 2023 ISG Provider Lens™ SAP Ecosystem
Recognized as a 'Challenger' in Avasant's SAP S/4HANA services
Footer bottom row seperator

© 2025 Kellton