...
Use the following procedure to generate a new random encryption key or to deploy a provided encryption key.
To create a new random encryption key, run the following command:
...
...
Use the following procedure to generate a new random encryption key or to deploy a provided encryption key.
To create a new random encryption key, run the following command:
...