This operation creates a new key, uses it to re-encrypt sensitive data, and grants the report server access to use the key. ...