After the Edge Encryption proxy server is installed and running, manage Edge Encryption through the proxy server.

You must complete all the steps in Installing Edge Encryption before creating encryption configurations and encryption patterns on the instance.
Note: To access the Edge Encryption configuration, you must log in through the proxy server and elevate to the security_admin role.