Upon identifying the quorum policy of the group associated with the cryptographic item, the key management system may transmit a request for approval to perform the requested operation to the set of entities. In embodiments, the key management system may query a data structure that includes identification information, such as a name, phone number, email address, etc. for the set of entities and provide the request for approval to the set of entities using the identification information. In embodiments, the request for approval may be an email, text message or other type of message sent to a computing device of a particular entity. In an embodiment, the request for approval may include a selectable icon, prompt or hyperlink to allow the entity to approve or reject the operation.
The processing logic may receive indications of approvals to perform the requested operation from corresponding entities of the set of entities (block 230). The indications of approvals may be received from one or more entities of the set of entities that can approve operations for a particular group. In some embodiments, upon receiving approval from an approving entity, the key management system may log the approval from the approving entity in a data structure stored at the key management system.