Encrypting Schema Source Files

The schema extract and load facilities provide hooks that enable you to encrypt the JADE method source code in your schema extract files so that you can release schema extract files without making their source code easily visible.

These encryption hooks enable you to incorporate data encryption algorithms of your choice, to make it difficult for anyone to view your method source code. For example, you may want to encrypt your source code before releasing a schema containing JADE applications for a third-party.

JADE provides a default encryption algorithm that is used if you do not specify an encryption library and you check the Encrypt Sources check box in the Extract dialog Schema Options sheet. You can specify an encryption library of your choice, by using the SchemaEncryptionHookLibrary parameter in the [JadeSecurity] section of the JADE initialization file.

As schema and forms definition files are treated as binary files, if the File Transfer Protocol (FTP) is used to transfer schema and forms definition files between machines, you must ensure that the transfer is done in binary mode (rather than ASCII) to prevent the removal of carriage return characters and the failure of the schema load process, particularly when schemas are encrypted.

For details about the encryption hook library parameter, see "JADE Security Section [JadeSecurity]", in the JADE Initialization File Reference and for details about the encryption hooks, see "Schema Source File Security" under "JADE Security", in Chapter 2 of the JADE Object Manager Guide.