Chapter 2: Creating and Managing Encryption Keys

Adaptive Server includes commands to create encryption keys, alter the properties of an encryption key, and drop unused encryption keys. Key owners must grant permission to table owners to use a specific key or keys to configure encryption at the column level.