{"id":3438,"date":"2023-04-12T15:33:12","date_gmt":"2023-04-12T15:33:12","guid":{"rendered":"https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/"},"modified":"2026-01-16T15:53:52","modified_gmt":"2026-01-16T15:53:52","slug":"ibm-planning-analytics-and-pgp","status":"publish","type":"post","link":"https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/","title":{"rendered":"How Do I Use PGP Encryption with IBM Planning Analytics for Secure Data Transfers?"},"content":{"rendered":"<p><strong>Pretty Good Privacy\u00a0<\/strong>(PGP) is an\u00a0encryption program\u00a0that provides\u00a0cryptographic\u00a0privacy\u00a0and\u00a0authentication\u00a0for\u00a0data communications. PGP is used for\u00a0signing, encrypting, and decrypting texts,\u00a0e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications.<\/p>\n<p>When you send a message using\u00a0PGP, the message is converted into unreadable ciphertext on your device <em>before<\/em> it passes over the Internet. Only the recipient has the key to convert the text back into the readable message on their device.<\/p>\n<p>When you use IBM Planning Analytics (PA) in the IBM Cloud, you have the option of enabling PGP in your environment. This article explains how to make it work.<\/p>\n<p><strong>Alternatives to PGP?<\/strong><\/p>\n<p>GnuPG\u00a0is another free encryption standard that companies may use that is based off of OpenPGP. GnuPG serves as a replacement for Symantec\u2019s PGP. The main difference is the supported algorithms. However, GnuPG plays nice with PGP by design. Because GnuPG is open, some businesses would prefer the technical support and the user interface that comes with Symantec\u2019s PGP.<\/p>\n<p>WinGPG\u00a0is a tray-based classical Windows application, Windows NT Explorer shell extension, and a classic GPGv2 distribution. Secure your data with thissimple encryption tool. Processing documents and other files without encryption could endanger your company&#8217;s and even your personal security.<\/p>\n<p><strong>Before You Start<\/strong><\/p>\n<p>Before you start, you need to send a <strong>service request<\/strong> to IBM Support and ask that PGP encryption be enabled and configured in the IBM Cloud environment you are using:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-1320\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/01\/B1-min.jpg\" alt=\"\" width=\"900\" height=\"227\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Note: Once you receive notification that PGP is enabled, you\u2019ll need to make sure you have administrator access to the IBM Cloud based Planning Analytics server as well as access to the shared folder to be able to complete the PGP implementation. Also, later in the setup process you will need to submit a second IBM request ticket (more on this in a bit).<\/p>\n<p><strong>The Step-by-step<\/strong><\/p>\n<p>First, establish a connection to the Planning Analytics Desktop using a remote desktop client (RDC). RDC clients must be configured to successfully connect to PA, so save yourself some work and use the provided preconfigured Windows Remote Desktop Connection client, MAC client or Linux (rhel) client that are included in the welcome kit zip file for your convenience (remember, a second copy of these RC clients are available on the folder share under installRemote Desktop Services).<\/p>\n<p>Next, navigate to your shared folder and locate a folder named \u201cinstall\/encryption\u201d (you\u2019ll need to use the username and password provided in the Welcome kit):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-1321\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/01\/b2-min.jpg\" alt=\"\" width=\"900\" height=\"234\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Then, in the <em>shared folder<\/em>, (if PGP has been enabled), you\u2019ll be able to navigate to a new folder named: \\datasinstallencryptionsamples:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-1322\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/01\/b3-min.jpg\" alt=\"\" width=\"886\" height=\"188\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Finally, you\u2019ll need to manually (using File Explorer) copy all *.pro files (there are two) to your TM1 Server data directory (for example, S:prodtm1Data) and copy all of the *.txt and *.bat files (there are four) to the server directory (for example, S:prodtm1):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-1329\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/01\/b4-min.jpg\" alt=\"\" width=\"735\" height=\"65\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-1330\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/01\/b5-min.jpg\" alt=\"\" width=\"900\" height=\"185\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>What are these Files?<\/strong><\/p>\n<p>The files include 2 TurboIntegrator \u201cdemo\u201d processes; I\u2019ll explain these in a bit. The other files are MS Windows .bat (batch) files that will initiate an encryption or decryption of a file. Lastly there is a \u201csample\u201d text file you can use to test the encryption\/decryption process as well as a standard README file with some minimal notes.<\/p>\n<p><strong>Complete the Setup<\/strong><\/p>\n<p>After the files are copied, you\u2019ll need to restart your TM1 Server for the .pro files (processes) to appear within the TM1 server.<\/p>\n<p><strong>Another IBM Request Ticket<\/strong><\/p>\n<p>Now you are ready for the next and final IBM request required to make PGP work. What you need to do (as explained in the README.txt file), is \u201cCreate a ticket, attach your public key, and ask for your public key to be imported\u201d. Before you can do this, you need to create your own public key (Note: In the Welcome kit provided after PGP is enabled, IBM provides an IBM public key, but you will need your own). Let\u2019s create a Public PGP key:<\/p>\n<ol>\n<li>On your own computer, download and install GoAnywhere OpenPGP Studio (its free: http:\/\/www.goanywhere.com).<\/li>\n<li>Open GoAnywhere OpenPGP Studio and click on Create.<\/li>\n<li>Enter your Name, E-Mail Address (this email address will be used in the encryption\/decryption processing) and Passphrase. Make sure you select \u201cRSA\u201d as the Key Type. You can leave the \u201cExpires On\u201d field blank.<\/li>\n<li>GoAnywhere OpenPGP Studio will create a key for you, and it should appear in the OpenPGP Keys list. Right-click on the key and select Export Public Key(s).<\/li>\n<li>The software will create a public key with an .asc extension. This is <em>the<\/em> public file you will attach to the IBM request, that they will \u201cimport\u201d into the IBM Cloud environment for you.<\/li>\n<\/ol>\n<p><strong>Let\u2019s Encrypt<\/strong><\/p>\n<p>In this example, we will assume we have extracted data to a file from a specific planning analytics view and the file has been saved to S:prodtm1 (where you previously saved the .txt and .bat files).<\/p>\n<p>In\u00a0MS Windows, a\u00a0batch file\u00a0(.bat) is a\u00a0file\u00a0that stores commands in sequential order. A command line interpreter then reads the\u00a0file\u00a0and executes the commands in that order. A\u00a0batch file\u00a0is simply a text\u00a0file\u00a0saved with the .\u00a0bat file\u00a0extension.<\/p>\n<p>To make this exercise work, you need to edit the provided \u201cdemo\u201d batch file. Since a batch file is a text file, you can use notepad or any text editor to do this.<\/p>\n<p>Open the demo_encryption.bat file in your text editor, find and replace firstname.lastname@mycompany.com with the name (the email address you entered when creating your public key earlier) in your <em>public key<\/em>. Next, find and replace the two instances of the string customer_to_ibm.txt with filename.extension (the file that you want to encrypt) or, for this simple exercise, you can leave the name of the test file provided.<\/p>\n<p>Below is the sample batch file sent in the welcome kit:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1334\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/01\/BB-min.jpg\" alt=\"\" width=\"1008\" height=\"253\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>The important line in the script file is:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1332\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/01\/B7-1024x250.jpg\" alt=\"\" width=\"903\" height=\"220\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Testing<\/strong><\/p>\n<p>Now, to test the encryption process we just set up, what do we need to do?<\/p>\n<p>Again, on the remote desktop, start Architect, and run the process demo_encryption.pro. The encrypted file, named filename.extension.gpg, should appear next to filename.extension. This process can\u2019t be any simpler. That is, there is one single line of code that simply executes the Windows batch script:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1333\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/01\/B8-1024x161.jpg\" alt=\"\" width=\"643\" height=\"101\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Notice the encrypted file is named \u201cibm_to_QueBIT.txt.gpg\u201d. The .gpg file\u00a0extension is used for an encrypted\u00a0file\u00a0format created by Free Software Foundation, Inc. These\u00a0GPG files\u00a0are also known as \u201cGNU Privacy Guard public keyring\u201d\u00a0files. Only the GNU Privacy Guard software can be used to open and access the data stored in these .gpg files.<\/p>\n<p>By the way, it is recommended you execute the batch file via the TurboIntegrator process; right-clicking and running the script (even as Administrator) yields inconsistent results.<\/p>\n<p><strong>Testing the Encryption<\/strong><\/p>\n<p>If you go ahead and try to open the encrypted file, here is what you will see:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-1335\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/01\/Blue-IBM-min.jpg\" alt=\"\" width=\"900\" height=\"100\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Final Thoughts<\/strong><\/p>\n<p>Well, now having jumped through a few hoops to \u201cprove out\u201d (yes it does work) the setup and use of PGP for encryption with IBM Planning Analytics, I should mention there are inherent problems with the use of it. Mostly, it is meant for smaller files and where solutions don\u2019t require the highest level of security. You can read up on the OpenPGP standards online at: https:\/\/tools.ietf.org\/html\/rfc4880.<\/p>\n<p>I should also mention the obvious \u2013 this was an <em>exercise<\/em>, and in a \u201cproduction environment\u201d you would never hard code file names, use processes or scripts named with \u201cdemo\u201d and you would be a bit more organized and not drop all of these files under the tm1 folder, etc. but again, this was just an exercise. Perhaps in a future post I will demonstrate the decryption process as well as provide some recommendations for automating the processing.<\/p>\n<p><strong>Ask QueBIT<\/strong><\/p>\n<p>Need help setting up PGP? Want to explore other encryption options? The experts at QueBIT are happy to discuss your needs. We\u2019re here to help!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pretty Good Privacy\u00a0(PGP) is an\u00a0encryption program\u00a0that provides\u00a0cryptographic\u00a0privacy\u00a0and\u00a0authentication\u00a0for\u00a0data communications. PGP is used for\u00a0signing, encrypting, and decrypting texts,\u00a0e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. When you send a message using\u00a0PGP, the message is converted into unreadable ciphertext on your device before it passes over the Internet. Only the recipient&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[43,36,49],"class_list":["post-3438","post","type-post","status-publish","format-standard","hentry","category-ibm","tag-administration","tag-planning-analytics","tag-planning-analytics-administration"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Do I Use PGP Encryption with IBM Planning Analytics for Secure Data Transfers? - QueBIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Do I Use PGP Encryption with IBM Planning Analytics for Secure Data Transfers? - QueBIT\" \/>\n<meta property=\"og:description\" content=\"Pretty Good Privacy\u00a0(PGP) is an\u00a0encryption program\u00a0that provides\u00a0cryptographic\u00a0privacy\u00a0and\u00a0authentication\u00a0for\u00a0data communications. PGP is used for\u00a0signing, encrypting, and decrypting texts,\u00a0e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. When you send a message using\u00a0PGP, the message is converted into unreadable ciphertext on your device before it passes over the Internet. Only the recipient&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/\" \/>\n<meta property=\"og:site_name\" content=\"QueBIT\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-12T15:33:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-16T15:53:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/03\/PA-Git-Integration-Features.png\" \/>\n\t<meta property=\"og:image:width\" content=\"842\" \/>\n\t<meta property=\"og:image:height\" content=\"439\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"agoddard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"agoddard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/ibm-planning-analytics-and-pgp\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/ibm-planning-analytics-and-pgp\\\/\"},\"author\":{\"name\":\"agoddard\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/e52d72da0fd2f5f70d189343fe4f5084\"},\"headline\":\"How Do I Use PGP Encryption with IBM Planning Analytics for Secure Data Transfers?\",\"datePublished\":\"2023-04-12T15:33:12+00:00\",\"dateModified\":\"2026-01-16T15:53:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/ibm-planning-analytics-and-pgp\\\/\"},\"wordCount\":1416,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/ibm-planning-analytics-and-pgp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/B1-min.jpg\",\"keywords\":[\"Administration\",\"Planning Analytics\",\"Planning Analytics Administration\"],\"articleSection\":[\"IBM\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/quebit.com\\\/askquebit\\\/ibm-planning-analytics-and-pgp\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/ibm-planning-analytics-and-pgp\\\/\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/ibm-planning-analytics-and-pgp\\\/\",\"name\":\"How Do I Use PGP Encryption with IBM Planning Analytics for Secure Data Transfers? - QueBIT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/ibm-planning-analytics-and-pgp\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/ibm-planning-analytics-and-pgp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/B1-min.jpg\",\"datePublished\":\"2023-04-12T15:33:12+00:00\",\"dateModified\":\"2026-01-16T15:53:52+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/e52d72da0fd2f5f70d189343fe4f5084\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/ibm-planning-analytics-and-pgp\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/quebit.com\\\/askquebit\\\/ibm-planning-analytics-and-pgp\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/ibm-planning-analytics-and-pgp\\\/#primaryimage\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/B1-min.jpg\",\"contentUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/B1-min.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/ibm-planning-analytics-and-pgp\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Do I Use PGP Encryption with IBM Planning Analytics for Secure Data Transfers?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#website\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/\",\"name\":\"QueBIT\",\"description\":\"QueBIT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/e52d72da0fd2f5f70d189343fe4f5084\",\"name\":\"agoddard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g\",\"caption\":\"agoddard\"},\"sameAs\":[\"https:\\\/\\\/quebit.com\\\/askquebit\"],\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/author\\\/agoddard\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Do I Use PGP Encryption with IBM Planning Analytics for Secure Data Transfers? - QueBIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/","og_locale":"en_US","og_type":"article","og_title":"How Do I Use PGP Encryption with IBM Planning Analytics for Secure Data Transfers? - QueBIT","og_description":"Pretty Good Privacy\u00a0(PGP) is an\u00a0encryption program\u00a0that provides\u00a0cryptographic\u00a0privacy\u00a0and\u00a0authentication\u00a0for\u00a0data communications. PGP is used for\u00a0signing, encrypting, and decrypting texts,\u00a0e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. When you send a message using\u00a0PGP, the message is converted into unreadable ciphertext on your device before it passes over the Internet. Only the recipient&hellip;","og_url":"https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/","og_site_name":"QueBIT","article_published_time":"2023-04-12T15:33:12+00:00","article_modified_time":"2026-01-16T15:53:52+00:00","og_image":[{"width":842,"height":439,"url":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/03\/PA-Git-Integration-Features.png","type":"image\/png"}],"author":"agoddard","twitter_card":"summary_large_image","twitter_misc":{"Written by":"agoddard","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/#article","isPartOf":{"@id":"https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/"},"author":{"name":"agoddard","@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/e52d72da0fd2f5f70d189343fe4f5084"},"headline":"How Do I Use PGP Encryption with IBM Planning Analytics for Secure Data Transfers?","datePublished":"2023-04-12T15:33:12+00:00","dateModified":"2026-01-16T15:53:52+00:00","mainEntityOfPage":{"@id":"https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/"},"wordCount":1416,"commentCount":0,"image":{"@id":"https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/#primaryimage"},"thumbnailUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/01\/B1-min.jpg","keywords":["Administration","Planning Analytics","Planning Analytics Administration"],"articleSection":["IBM"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/","url":"https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/","name":"How Do I Use PGP Encryption with IBM Planning Analytics for Secure Data Transfers? - QueBIT","isPartOf":{"@id":"https:\/\/quebit.com\/askquebit\/#website"},"primaryImageOfPage":{"@id":"https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/#primaryimage"},"image":{"@id":"https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/#primaryimage"},"thumbnailUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/01\/B1-min.jpg","datePublished":"2023-04-12T15:33:12+00:00","dateModified":"2026-01-16T15:53:52+00:00","author":{"@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/e52d72da0fd2f5f70d189343fe4f5084"},"breadcrumb":{"@id":"https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/#primaryimage","url":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/01\/B1-min.jpg","contentUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/01\/B1-min.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/quebit.com\/askquebit\/ibm-planning-analytics-and-pgp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/quebit.com\/askquebit\/"},{"@type":"ListItem","position":2,"name":"How Do I Use PGP Encryption with IBM Planning Analytics for Secure Data Transfers?"}]},{"@type":"WebSite","@id":"https:\/\/quebit.com\/askquebit\/#website","url":"https:\/\/quebit.com\/askquebit\/","name":"QueBIT","description":"QueBIT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/quebit.com\/askquebit\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/e52d72da0fd2f5f70d189343fe4f5084","name":"agoddard","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g","caption":"agoddard"},"sameAs":["https:\/\/quebit.com\/askquebit"],"url":"https:\/\/quebit.com\/askquebit\/author\/agoddard\/"}]}},"_links":{"self":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/3438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/comments?post=3438"}],"version-history":[{"count":2,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/3438\/revisions"}],"predecessor-version":[{"id":4982,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/3438\/revisions\/4982"}],"wp:attachment":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/media?parent=3438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/categories?post=3438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/tags?post=3438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}