This example demonstrates how an application can perform multiple KMIP Create symmetric key operations in a single request to a KMIP server.
The same approach can be used to make different multiple KMIP operations in a single KMIP request (e.g., destroy key)