Understanding Key Rings
Cryptography keys may be used to provide a signature or credentials to a request so that the system recognizes that the request comes from a trusted party. Keys may also be used to encrypt or decrypt files shared between two parties.
The Key Ring object is provided to reference the keys that are used over time for a given business use case. Only one key or key pair may be active at any given time.
The following sections include information about the functionality provided to support different key ring classes for particular use cases.