Encryption Guide About Managed Key Encryption Key Management Tasks Manage Keys in Key Files Managing Keys with the Key Management Interoperability Protocol (KMIP) Storage-Independent Key Management Tasks Using Encrypted Databases Create an Encrypted Database Establish Access to an Encrypted Database Close the Connection to an Encrypted Database Move an Encrypted Database Between Instances Configure Encryption Startup Settings Encrypt the Databases that Ship with InterSystems IRIS Modify Database Encryption Using ^EncryptionKey Using Data-Element Encryption Programmatically Manage Keys Data-Element Encryption Calls Support for Re-Encrypting Data in Real Time Protecting Against Data Loss Handling Emergency Situations Handle Emergency Situations When Using Key Files Handle Emergency Situations When Using a KMIP Server Additional Encryption Information Key File Encryption Information Encryption and Database-Related Facilities About Calls to Perform Encryption, Hashing, and Other Key-Related Operations FIPS 140–2 Compliance for Database Encryption Enabling FIPS Support Startup Behavior and messages.log