FIG. 2 illustrates a flow diagram of an example method 200 to perform a requested operation with a cryptographic item upon receiving quorum approval. In general, the method 200 may be performed by processing logic that may include hardware (e.g., processing device, circuitry, dedicated logic, programmable logic, microcode, hardware of a device, integrated circuit, etc.), software (e.g., instructions run or executed on a processing device), or a combination thereof. In some embodiments, the method 200 may be performed by the key management system 120 of FIG. 1.
As shown in FIG. 2, the method 200 may begin with the processing logic receiving a request to perform an operation on a cryptographic item (block 210). In embodiments, the processing logic may receive the request from application 130 of FIG. 1. In some embodiments, upon receiving the request to perform the operation, the key management system may assign an identifier to the request that may be used to subsequently identify the requested operation. In an embodiment, the cryptographic item may be a cryptographic key that is utilized to perform cryptographic operations. In embodiments, the requested operation received at block 210 may correspond to an operation to be performed on the cryptographic key. For example, the requested operation may correspond to a request to export the cryptographic key to the application for use in cryptographic operations. Other examples of requested operations performed with respect to a cryptographic key may include modifying a cryptographic key, assigning a cryptographic key to a new group, deleting a cryptographic key, etc.