Request decryption key
You can get the decryption key from your SAP® administrator. Before you can request the key from your SAP® administrator you need the socalled Request IDThe Request ID is a unique identifier that is assigned to a process in the SAP® system. Each time you run a SmartExporter data extraction a Request ID is generated. The SAP® administrator needs this ID to generate a key for the decryption. Note that if you run a Data Request several times, for each run a separate Request ID is generated.. The Request ID allows the SAP® administrator to clearly identify the process that extracted the encrypted data. This is a prerequisite that he can provide you with the matching key.
During each SmartExporter data extraction a protocol file (<yyyymmddhhmmss>_<SAP® system ID>.log) is generated and stored to the extraction folder. The extraction folder is the storage directory defined for the extracted files in SmartExporter. This protocol file contains the Request ID required by the SAP® administrator to generate the correct key for the decryption.
Follow the steps described below if you do not have any key from your SAP® administrator yet:
- The Please enter the key field in the Enter key tab is empty. Click I don’t have the key for the decryption. How do I get it? to open this area.
- Select the Browse button to locate the protocol file that was generated during the extraction of the encrypted data. The protocol file is contained in the extraction folder.
Note: If the same Data Request was run multiple times, it is necessary to select the run that was used to extract the encrypted data at hand.
(If needed, you can get further information on how to find the extraction folder and what to do if you encounter problems finding the protocol file.) - From the protocol file the program can retrieve the Request ID and the Data Request name, which will both be displayed. Click the Copy information to clipboard button.
- Now send these data to your SAP® administrator and ask him for the decryption key.
How can I find the extraction folder containing the protocol file?

- Open the SmartExporter Windows client.
- Click Run or manage Favorites and double-click the Data Request in question to open it.
- Go to the Options step in the Navigator. In the Where do you want to save your files? field you find the path to your extraction directory. The protocol file is stored to this extraction folder.

Contact the person who extracted the data and ask him to provide you with the protocol file.
I cannot find the protocol file. What can I do?
- The SAP® administrator can access a list of all generated Request IDsThe Request ID is a unique identifier that is assigned to a process in the SAP® system. Each time you run a SmartExporter data extraction a Request ID is generated. The SAP® administrator needs this ID to generate a key for the decryption. Note that if you run a Data Request several times, for each run a separate Request ID is generated.. Perhaps he can identify the required Request ID if you can give him specific information, e.g.: What was the name of the SmartExporter Data Request? Who ran the Data Request? When was the Data Request run?
Note: If the same Data Request was run multiple times, it is necessary for the SAP® administrator to select the run that was used to extract the encrypted data at hand. - If the Data Request was run asynchronously, it might still be included in the list of Data Request activities. On the Home page of SmartExporter click Manage Data Request activities and check if the relevant Data Request is included in the list. If this is the case, click the Details link. You can find the Request IDThe Request ID is a unique identifier that is assigned to a process in the SAP® system. Each time you run a SmartExporter data extraction a Request ID is generated. The SAP® administrator needs this ID to generate a key for the decryption. Note that if you run a Data Request several times, for each run a separate Request ID is generated. in the Request ID row.
Note: If the same Data Request was run multiple times, it is necessary to select the run that was used to extract the encrypted data at hand.
Copyright © 2019 Audicon GmbH. All rights reserved.