alter encryption key

See Chapter 5, “Protecting Data Privacy from the Administrator,” for alter encryption key usage information. See the Reference Manual: Commands for the complete syntax.