Skip to content

Keys

The Keys module provides centralized lifecycle management for all cryptographic signing keys used by the platform.

Keys Inventory


Administrators can:

  • Generate new signing keys
  • Import existing private keys
  • Rotate key material
  • Revoke or deactivate keys
  • Monitor status and usage
  • Filter across large key inventories

This module enforces governance, auditability, and strict access control over private key operations.


Each key entry includes:

  • Alias – Human-readable identifier
  • Key ID – Unique internal identifier
  • Algorithm – RSA, ECDSA
  • Key Size – 1024 / 2048 / 4096 bits
  • Storage Type – Software or Local Vault (HSM-backed)
  • Provider – Associated cryptographic provider
  • Status – Active, Inactive, Rotated, Revoked, Expired
  • Created At
  • Expires At
  • Policies Linked

Summary cards provide real-time visibility into:

  • Total Keys
  • Active Keys
  • Keys In Use
  • HSM Keys

Create cryptographic key pairs directly within the platform.

Generate Key

Configuration includes:

  • Alias
  • Algorithm
  • Key Size
  • Storage Type
  • Optional expiration
  • Description

If stored in Local Vault (HSM-backed), private key material never leaves the boundary.


Import externally generated private keys.

Import Key

Supported formats:

  • PEM
  • DER
  • PKCS#8

Imported keys are encrypted at rest and immediately governed by platform policies.


Efficiently locate keys using structured filters.

Filter Keys

Filter by:

  • Algorithm
  • Storage Type
  • Status
  • Provider

Search by Alias or Key ID.


Inspect complete metadata for any key.

Key Details

Details include:

  • Algorithm
  • Key size
  • Storage boundary
  • Status
  • Creation timestamp

Accessible via the actions menu.

Key Options

Rotate Key

  • Creates new key version
  • Preserves historical reference
  • Maintains audit trail

  • Permanently disables signing
  • Cannot be reversed
  • Audit record preserved

  • Temporarily disable key usage
  • Useful during maintenance windows

Delete Key

  • Permanent removal
  • Confirmation required
  • Operation is irreversible

  • Private keys remain within defined storage boundary
  • Policy enforcement occurs before signing operations
  • All lifecycle events are audit logged
  • Revoked keys cannot be reused
  • Rotation maintains cryptographic continuity