Edge Encryption configuration

After the Edge Encryption proxy server is installed and running, manage Edge Encryption through the proxy server.

You must complete all the steps in Edge Encryption installation before creating encryption configurations and encryption patterns on the instance.
Note: To access Edge Encryption configuration, you must log in through the proxy server and elevate to the security_admin role.