Key recovery mechanism
A solution for key management will be provided along with a key recovery mechanism in case a private key is lost.
To enable key security management, users will be able to revoke their identity keys if they detect that their private key has been compromised, and this change will be applied and published so no further use of this keys can be allowed.
Keys are generated in a device and they never leave it. The way an identity connect to applications is that new authorized keys are generated for new applications that need authentication.
Users will use the key recovery policy they want to choose from the options that will be enabled for that purpose.