This flowchart represents the onboarding process for an application that involves encryption. Based on the selected encryption type (Symmetric or Asymmetric), different steps are followed to ensure secure key or certificate management. The final output is either a set of secrets or a certificate, which is then processed or stored in Encrova.