Chapter 11. Configuring automated unlocking of encrypted volumes by using policy-based decryption