Read and Review Automation Anywhere Documentation

Automation Anywhere Version 11.3

Close Contents

Contents

Open Contents

PGP command

  • Updated: 9/28/2020
    • 11.3.x
    • Explore
    • Enterprise

PGP command

Use the PGP (Pretty Good Privacy) command to automatically encrypt and decrypt files for security.

Overview

The PGP command automates the process of encrypting and decrypting files.

To learn more, search for the Encrypting and Decrypting Files: How to Automate Using Keys course in Automation Anywhere University: RPA Training and Certification (A-People login required).

The command supports two types of encryption: symmetric (pass phrase) and asymmetric (public/private keys):

  • PGP Pass phrase: Requires a pass phrase to encrypt and decrypt.
  • PGP Public/Private Key: Requires a PGP public and private key file to encrypt and decrypt.
Encrypt Files
Encrypts one or more files using one of the above encryption methods.
Select a symmetric algorithm from the drop-down menu. The algorithm options are:
  • Idea
  • TripleDES
  • CAST5
  • Blowfish
  • AES128
  • AES192
  • AES256
  • Twofish256
Optionally, mark the Overwrite Files/Folder check box to replace older files with the same name.
If required, append the extension for the destination file. For example, .enc.
Compress the encrypted files using one of the compression algorithms:
  • zip
  • bzip2
  • zlib
If required, mark the Armor data (text output) check box to enable ASCII Armor output.
Decrypt Files
Decrypts one or more files that have been previously encrypted.
Optionally, mark the Overwrite Files/Folder check box to replace older files with the same name.
If required, append the extension for the destination file. For example, .enc.
Create Keys
Creates public and private encryption keys.
Add additional security to the keys by specifying a password that encrypts the keys.
Optionally, mark the Overwrite Files check box to replace older files with the same name.
Tip: In the above mentioned commands, press the F2 key to insert a Credential Variable for enhanced security. Read more about Assigning credential variables from credential lockers.
Send Feedback