Encrypted files can easily be decrypted manually using an OpenPGP tool such as GPG or PGP. However, if you receive decrypted files in bulk regularly, and want to automate the whole process of decrypting those files, you can do that by creating a workflow in Astera Centerprise.
Get reviews, hours, directions, coupons and more for Centerprise Information Solutions at 2857 Riviera Dr, Fairlawn, OH 44333. Search for other Computer Software & Services in Fairlawn on The Real Yellow Pages®. Intel Adds Support for Iris Xe Max Graphics (DG1) - Get Version 27.20.100.9168. This driver fixes crashes seen when launching Cyberpunk 2077. Global Nav Open Menu Global Nav Close Menu; Apple; Shopping Bag +.
GPG4Win Integration in Centerprise¶
GPG4Win is one of the many tools commonly used to decrypt encrypted files. Generally, it is run using Window’s Command Prompt. To integrate it with Centerprise, you can create a batch file and run it using the RunExe Task in a workflow. The batch file contains commands that are to be executed on GPG4Win to decrypt files.
Creating a Batch File¶
A batch file is a simple text file that contains commands that are to be executed on GPG4Win to decrypt files. A batch file can be created by opening a new file in Notepad and saving it with ‘.bat’ extension.
Variables Required for Decryption¶
- *PriKey* – Location where the Private Key resides
- *Passphrase* – Passphrase required to access the Private Key
- *Output* – Destination path of decrypted files (with new filename)
- *Input* – Location path to the encrypted files
Batch File Explanation¶
Here we have created a batch file in Notepad. It contains the following commands to be run in the GnuPG environment.
- echo off – echo prints the command being executed on the command prompt. Turning it off prevents it.
- gpg – GNU Privacy Guard; it indicates that the following command is for GNUPG.
- –import %prikey% - This imports the Private Key required for decryption. This is an essential step and the proper way to import the PriKey.
- –no/yes – Permission to overwrite if a file with the same name already exists. If set to no, and a file with the same name already exists, it will not perform any action, and the job will be counted as ‘unsuccessful.’ You can utilize the ‘Fail Action if Unsuccessful’ option (in the RunExe workflow task) to terminate the flow or ignore it as required.
- –pinentry-mode=loopback – GnuPG requires you to enter passphrase for which it gives a pop-up at runtime. Since this passphrase needs to be entered manually in the pop-up, it may hinder automated jobs. The ‘loopback’ pinentry-mode forces it to suppress the pop-up and utilize the passphrase in the batch file itself.
- –passphrase %passphrase% – Since the private key is stored somewhere on the computer, it should be secured to prevent unauthorized access. The passphrase is a secret phrase (just like a password) needed to utilize the private key, without which the key will not work.
- -o %output% – Destination of decrypted files (including new filename)
- -d %input% – Path to the files to be decrypted
Automating the Process in Astera Centerprise¶
Here, we’ve already designed a workflow using a File System Items Source task, an Expression task, and a RunExe task. We’ve also used a Variable object to pass the PriKey location path and the Passphrase to access the PriKey.

The FileSystemItemsSource utilizes ‘.gpg’ filter to filter out encrypted files and runs in a loop to execute the corresponding RunExe task for all of them one by one.
The Expression task uses the information from Variables and FileSystemItemsSource to generate a parameter string.
The parameter string contains all 4 parameters (variables required for decryption), separated by a single space and enclosed within quotes. As in, Variables.key + “ “” + Variables.passphrase + “” “” + output + “” “” + InPath +”””
The Variable object feeds the path to the Private Key and Passphrase into the parameter string in the Expression task, during runtime.
Next, we have used a RunExe task to run the batch file in GnuPG environment. The Program Path is the path to the batch file, whereas the ‘Run in’ is the location of the GnuPG environment where the commands will be run.
The batch file does not have the four parameters (arguments), and we have fed these parameters to it using the parameter string from the Expression object.
Our workflow is ready. You can now schedule it on Astera Integration Server to be executed automatically at your specified time and frequency.
Before you run the workflow, make sure you’re logged on to Astera Integration Server with an account that has access to the Private Key. To do that, go to Services > Astera Integration Server 8 > Properties > Log On.
Let’s run this workflow. You can observe the progress in the job trace.
Now, if you look at the location we specified for the output, you can see that all source files have been successfully decrypted and stored in a new folder named ‘Output.’
This concludes integrating GPG commands and orchestrating the file decryption process in Astera Centerprise.
Partnerships
Our partner relationships are key to our success. By working closely with them and understanding the market requirements, we ensure that we deliver innovative and practical solutions.
Our Partners
Find a tailored solution based on one of our joint enterprises.
Become a Partner
Apply to collaborate on a project and leverage our market expertise.
DELL
Dell empower countries, communities, customers and people everywhere to use technology to realize their dreams. Customers trust DELL to deliver technology solutions that help them do and achieve more, whether they’re at home, work, school or anywhere in their world. Learn more about our story, purpose and people behind our customer-centric approach.
Collaborations with DELL
We have worked closely with DELL on a number of projects. We have recently launched our flagship line of rugged laptops based on DELL hardware, the TriCIS Rugged Laptop Series, available with an integrated Eclypt Core Module from Viasat.
EUROTEMPEST
Eurotempest specialises in qualified defense- and government customers’ needs of high-assurance IT products and systems. Eurotempest operations in the Netherlands and in the United Kingdom are part of Eurotempest AB group, the IT branch of Boxholms AB group.
Eurotempest staff has decades of experience from various high-assurance projects involving TEMPEST, environmental requirements and crypto.
Viasat
Millions of computers are lost or stolen annually, putting classified and sensitive data at risk of breach. Viasat Eclypt® encrypted hard drives and Inline Media Encryptors are accredited and used by government agencies and military forces worldwide to ensure premium data protection.
Centerprise Laptops & Desktops Driver Download Windows 7
Utilizing our unique relationship with Viasat, we have been able to utilize the Eclypt Core Module across a number of products including our TriCIS Rugged Series Laptops, which utilize the standalone module interfaced to an M.2 SSD for impressive read/write speeds.
Teradici
Teradici’s PCoIP® technology is a best-in-class protocol that enables organizations to create secure virtual workspaces for a high-definition, highly-responsive computing experience. It is the most secure remoting technology in the marketplace, enabling visualization of even the most graphics-intensive applications.
Teradici and their PCoIP technology power a spectrum of local, remote and collaborative workstyles, universally connected via on-premises data centers or through a cloud. PCoIP technology fundamentally simplifies how computing is provisioned, managed and used.
Hewlett Packard Enterprise
Hewlett Packard Enterprise is the global edge-to-cloud Platform-as-a-Service company that helps organizations accelerate outcomes by unlocking value from all of their data, everywhere.
Hewlett Packard Incorporated
As a premier manufacturer of software and computer services, HP's vision is to create technology that makes life better for everyone, everywhere — every person, every organization, and every community around the globe and to engineer experiences that amaze.
DXC Technology
DXC Technology is a global IT services company that leads digital transformations for clients by managing and modernizing mission-critical systems, integrating them with new digital solutions to produce better business outcomes.
Their global reach and talent, innovation platforms, technology independence and extensive partner network enable 6,000 private and public-sector clients in 70 countries to thrive on change.
THALES
Thales Group are a leading French multinational company that design and build electrical systems and provides services for the aerospace, defence, transportation and security markets.
Centerprise
Centerprise was established in 1983 and has a strong reputation as one of the UK’s most respected IT providers. Centerprise has a strong presence within the UK public sector and has an ever-growing footprint within the private sector.
Centerprise has been a trusted supplier to the MOD for more than 30 years and is also a significant supplier of IT products, solutions and services within the Education, Central and Local Government, Emergency Services and Healthcare sectors.
Booz Allen Hamilton
Booz Allen has been delivering innovative solutions to clients for more than a century, and the firm has embarked on a mission to infuse an intentional culture of innovation throughout the organization.

TriCIS are partnered with Booz Allen Hamilton and the District Defend team to produce a new secure mobility solution.
2makeIT
Centerprise Laptops & Desktops Driver Download
2makeIT are TriCIS’ representative in the territory of Sweden. They possess solid knowledge in secure client solutions and IT infrastructure for authorities, private companies, and the military sector.
