Configuring Proper Key-Encrypting Keys