The following steps show the general procedure for configuring and using data encryption. For information about encryption properties, see Encryption Properties.
For information about creating LOCAL or OKM keystores, see the following topics:
For information about creating LOCAL or OKM keys, see the following topics:
For information about creating a project, see Creating a Project (BUI).
For information about creating a share, see Shares and Projects or Creating an Encrypted Project (CLI).