Annie
Correct. We are basically a user inserting, updating and deleted the data into the target database based on the encryption that has been setup and using the correct key.
Terry
Annie
Correct. We are basically a user inserting, updating and deleted the data into the target database based on the encryption that has been setup and using the correct key.
Terry