Key States
Each key has its state that determines which operations can be performed using that key. Before performing any crypto operations, the state transitions need to be considered. A key can have following states throughout its lifecycle:
| Key States | Behavior |
|---|---|
| Pre-Active | The key is not usable, exportable. No cryptographic operations are allowed. |
| Active | The key can be used in protect and reveal operations. |
| Compromised | The key can't be used to protect data. Only reveal operation is allowed. |
| Deactivated | The key can't be used to protect and reveal data. |
| Destroyed | The key bytes are no longer available for use. |