The key used to encrypt Keyword values can be rotated. This section describes the process of rotating the Key Encryption Key (KEK), deploying the key, and upgrading OnBase after rotating the key.
The key used to encrypt Keyword values can be rotated. This section describes the process of rotating the Key Encryption Key (KEK), deploying the key, and upgrading OnBase after rotating the key.