Right-click then select Duplicate. The Command Line Editor opens. It is a copy of

Working with Procedures, Variables, Sequences, and User Functions 12-9

2. Right-click and select Execute.

3. In the Execution dialog, set the execution parameters. Refer to

Table 20–1 for more information.

4. Click OK.

5. The Session Started Window appears.

6. Click OK.

12.1.3.2 Using a Procedure in a Package

Procedures can be used as package steps. Refer to the Section 10.3.1.2, Executing a Procedure for more information on how to execute a procedure in a package step. Note that if you use a procedure in a package step, the procedure is not a copy of the procedure you created but a link to it. If this procedure is modified outside of the package, the package using the procedure will be changed, too.

12.1.3.3 Generating a Scenario for a Procedure

It is possible to generate a scenario to run a procedure in production environment, or to schedule its execution without having to create a package using this procedure. The generated scenario will be a scenario with a single step running this procedure. How to generate a scenario for a procedure is covered in Section 13.2, Generating a Scenario .

12.1.4 Encrypting and Decrypting Procedures

Encrypting a Knowledge Module KM or a procedure allows you to protect valuable code. An encrypted KM or procedure can neither be read nor modified if it is not decrypted. The commands generated in the log by an Encrypted KM or procedure are also unreadable. Oracle Data Integrator uses a DES Encryption algorithm based on a personal encryption key. This key can be saved in a file and reused to perform encryption or decryption operations.

12.1.4.1 Encrypting a KM or Procedure

To encrypt a KM or a Procedure:

1. Right-click the KM or procedure you wish to encrypt.

2. Select Encrypt.

Note: During this execution the Procedure uses the option values set on the Options tab of the Procedure editor. Note: If you don’t want to use the option values set on the Options tab of the Procedure, set the new options values directly in the Options tab of the Procedure step. WARNING: There is no way to decrypt an encrypted KM or procedure without the encryption key. It is therefore strongly advised to keep this key in a safe location. It is also advised to use a unique key for all the developments.