Using policies to manage encryption assets
Policies provide a hierarchical framework for managing configuration and objects within your environment, much like hierarchical directories such as Active Directory.
Policies can contain system objects (such as Devices, Applications, and Certificates) as well as other policies. Each policy enables you to set the configuration for each object type contained below it. For example, if several IIS Application objects are contained within a policy, one or more of the configuration attributes for those IIS objects can be defined on the policy. Consequently, policies can be used to standardize object configuration parameters and enforce security requirements throughout your encryption environment.
This section provides the information you need to manage your encryption resources using policies:
TIP To browse topics in this section, use the menu on the left side of this page.