Choose Your Configure Encryption Procedure

There are three “flavors” of the Configure Encryption procedure. Choose the one that corresponds to your environment’s installation framework.