1. Customer will encrypt the date using Fusion provided public key.
2. Security Console setup will be done in Fusion which will decrypt the data before loading to system
3. Data to be sent out will be encrypted using Customer provided public key. So customer needs to provide public key.
4. Always public keys are shared.
2. Security Console setup will be done in Fusion which will decrypt the data before loading to system
3. Data to be sent out will be encrypted using Customer provided public key. So customer needs to provide public key.
4. Always public keys are shared.